Analysis
-
max time kernel
23s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-02-2021 03:31
Static task
static1
Behavioral task
behavioral1
Sample
TT.exe
Resource
win7v20201028
General
-
Target
TT.exe
-
Size
24KB
-
MD5
31823aba37e4612f84e00a36615982d2
-
SHA1
9d3d1aac3aa20fcba8e62316c7202226325c7601
-
SHA256
abec75c995b6bac05ca3aa49002dedb12a4fc7194e93f814f3edbb996d9cfa7a
-
SHA512
06dfc45e33b2f90437711ede586412dba3838f2f9b79020d8846a11838879f418a9089d2d555cd8772895f9ff446f3a015d9c279ae5b5f0e28402373e229959f
Malware Config
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Nirsoft 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 776 AdvancedRun.exe 1504 AdvancedRun.exe 3548 AdvancedRun.exe 3164 AdvancedRun.exe -
Processes:
TT.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection TT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" TT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths TT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\TT.exe = "0" TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TT.exe -
Processes:
TT.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exepowershell.exepowershell.exeAdvancedRun.exeAdvancedRun.exepid process 776 AdvancedRun.exe 776 AdvancedRun.exe 776 AdvancedRun.exe 776 AdvancedRun.exe 1504 AdvancedRun.exe 1504 AdvancedRun.exe 1504 AdvancedRun.exe 1504 AdvancedRun.exe 1124 powershell.exe 4064 powershell.exe 3548 AdvancedRun.exe 3548 AdvancedRun.exe 3548 AdvancedRun.exe 3548 AdvancedRun.exe 4064 powershell.exe 1124 powershell.exe 3164 AdvancedRun.exe 3164 AdvancedRun.exe 3164 AdvancedRun.exe 3164 AdvancedRun.exe 4064 powershell.exe 1124 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
TT.exeAdvancedRun.exeAdvancedRun.exepowershell.exepowershell.exeAdvancedRun.exeAdvancedRun.exedescription pid process Token: SeDebugPrivilege 3884 TT.exe Token: SeDebugPrivilege 776 AdvancedRun.exe Token: SeImpersonatePrivilege 776 AdvancedRun.exe Token: SeDebugPrivilege 1504 AdvancedRun.exe Token: SeImpersonatePrivilege 1504 AdvancedRun.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 3548 AdvancedRun.exe Token: SeImpersonatePrivilege 3548 AdvancedRun.exe Token: SeDebugPrivilege 3164 AdvancedRun.exe Token: SeImpersonatePrivilege 3164 AdvancedRun.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
TT.exeAdvancedRun.exeAdvancedRun.exedescription pid process target process PID 3884 wrote to memory of 776 3884 TT.exe AdvancedRun.exe PID 3884 wrote to memory of 776 3884 TT.exe AdvancedRun.exe PID 3884 wrote to memory of 776 3884 TT.exe AdvancedRun.exe PID 776 wrote to memory of 1504 776 AdvancedRun.exe AdvancedRun.exe PID 776 wrote to memory of 1504 776 AdvancedRun.exe AdvancedRun.exe PID 776 wrote to memory of 1504 776 AdvancedRun.exe AdvancedRun.exe PID 3884 wrote to memory of 4064 3884 TT.exe powershell.exe PID 3884 wrote to memory of 4064 3884 TT.exe powershell.exe PID 3884 wrote to memory of 4064 3884 TT.exe powershell.exe PID 3884 wrote to memory of 1124 3884 TT.exe powershell.exe PID 3884 wrote to memory of 1124 3884 TT.exe powershell.exe PID 3884 wrote to memory of 1124 3884 TT.exe powershell.exe PID 3884 wrote to memory of 3548 3884 TT.exe AdvancedRun.exe PID 3884 wrote to memory of 3548 3884 TT.exe AdvancedRun.exe PID 3884 wrote to memory of 3548 3884 TT.exe AdvancedRun.exe PID 3548 wrote to memory of 3164 3548 AdvancedRun.exe AdvancedRun.exe PID 3548 wrote to memory of 3164 3548 AdvancedRun.exe AdvancedRun.exe PID 3548 wrote to memory of 3164 3548 AdvancedRun.exe AdvancedRun.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
TT.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT.exe"C:\Users\Admin\AppData\Local\Temp\TT.exe"1⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exe" /SpecialRun 4101d8 7763⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\TT.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\TT.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\TT.exe" /WindowState ""1"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exe" /SpecialRun 4101d8 35483⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
04d65b84358bfdfd84fa3b4de1ff12f4
SHA1367d9c80807b4e2c7d8b23423097307b2086bde6
SHA256138f3482585e3a2aef80564fcc98e0bc70607d60c53e25903079443fcdaa6f32
SHA51241317e948c64b2602710efbf2d6e42dd0329e1716ac51739cb134bfab494e910d7a48c44a80bc97fc396b2e2e5411c5f4b8529c472960b814ad53450ee329333
-
C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\6e746a8d-1cc5-40cc-b057-05eaf4750f30\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b65393e3-f01f-4787-9dde-33eed69914b7\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
memory/776-10-0x0000000000000000-mapping.dmp
-
memory/1124-34-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/1124-49-0x0000000009310000-0x0000000009343000-memory.dmpFilesize
204KB
-
memory/1124-32-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/1124-77-0x00000000095B0000-0x00000000095B1000-memory.dmpFilesize
4KB
-
memory/1124-16-0x0000000000000000-mapping.dmp
-
memory/1124-73-0x00000000095C0000-0x00000000095C1000-memory.dmpFilesize
4KB
-
memory/1124-71-0x0000000006D63000-0x0000000006D64000-memory.dmpFilesize
4KB
-
memory/1124-65-0x00000000092F0000-0x00000000092F1000-memory.dmpFilesize
4KB
-
memory/1124-54-0x000000007F470000-0x000000007F471000-memory.dmpFilesize
4KB
-
memory/1124-19-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/1124-30-0x00000000079D0000-0x00000000079D1000-memory.dmpFilesize
4KB
-
memory/1124-28-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/1124-26-0x0000000006D60000-0x0000000006D61000-memory.dmpFilesize
4KB
-
memory/1124-27-0x0000000006D62000-0x0000000006D63000-memory.dmpFilesize
4KB
-
memory/1504-13-0x0000000000000000-mapping.dmp
-
memory/3164-39-0x0000000000000000-mapping.dmp
-
memory/3548-36-0x0000000000000000-mapping.dmp
-
memory/3884-5-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/3884-7-0x0000000005C60000-0x0000000005D03000-memory.dmpFilesize
652KB
-
memory/3884-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/3884-2-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/3884-20-0x00000000085A0000-0x00000000085A1000-memory.dmpFilesize
4KB
-
memory/3884-8-0x0000000008650000-0x0000000008651000-memory.dmpFilesize
4KB
-
memory/3884-9-0x0000000008150000-0x0000000008151000-memory.dmpFilesize
4KB
-
memory/3884-6-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/4064-41-0x0000000008080000-0x0000000008081000-memory.dmpFilesize
4KB
-
memory/4064-21-0x0000000007960000-0x0000000007961000-memory.dmpFilesize
4KB
-
memory/4064-51-0x000000007F6B0000-0x000000007F6B1000-memory.dmpFilesize
4KB
-
memory/4064-42-0x00000000089E0000-0x00000000089E1000-memory.dmpFilesize
4KB
-
memory/4064-18-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/4064-67-0x0000000009850000-0x0000000009851000-memory.dmpFilesize
4KB
-
memory/4064-69-0x0000000009C10000-0x0000000009C11000-memory.dmpFilesize
4KB
-
memory/4064-24-0x0000000007320000-0x0000000007321000-memory.dmpFilesize
4KB
-
memory/4064-72-0x0000000007323000-0x0000000007324000-memory.dmpFilesize
4KB
-
memory/4064-17-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/4064-15-0x0000000000000000-mapping.dmp
-
memory/4064-45-0x0000000008950000-0x0000000008951000-memory.dmpFilesize
4KB
-
memory/4064-25-0x0000000007322000-0x0000000007323000-memory.dmpFilesize
4KB