Analysis

  • max time kernel
    21s
  • max time network
    18s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    06-03-2021 22:27

General

  • Target

    50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe

  • Size

    2.3MB

  • MD5

    921379bd587ab29da4dc23fb9d47fe36

  • SHA1

    e9db1731731503a81a2fdc67ffa005e6aa2a8038

  • SHA256

    50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6

  • SHA512

    90211127d4dd83619bf42a1ab1f5d78d1a9f8ab7767704b19432d681807b636cf2bfbeb5ae97e25b57071e2a04f3b13e5a3f28b69d392b94f7ac0b3015ff38fc

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 13 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:704
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
        PID:952
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:2984
          • C:\Users\Admin\AppData\Local\Temp\50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
            "C:\Users\Admin\AppData\Local\Temp\50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe"
            2⤵
            • Modifies firewall policy service
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1176
            • C:\Users\Admin\AppData\Roaming\TempoRX\VID001.exe
              "C:\Users\Admin\AppData\Roaming\TempoRX\VID001.exe"
              3⤵
              • Modifies firewall policy service
              • Executes dropped EXE
              • Deletes itself
              • Drops startup file
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3660
        • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
          "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
          1⤵
            PID:3200
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3436
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3736
              • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                1⤵
                  PID:3212
                • c:\windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  1⤵
                    PID:2452
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                    1⤵
                      PID:2332
                    • c:\windows\system32\sihost.exe
                      sihost.exe
                      1⤵
                        PID:2324
                      • C:\Windows\system32\fontdrvhost.exe
                        "fontdrvhost.exe"
                        1⤵
                          PID:708
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                          1⤵
                            PID:2780
                          • C:\Windows\system32\backgroundTaskHost.exe
                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca
                            1⤵
                              PID:3952

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Modify Existing Service

                            1
                            T1031

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Privilege Escalation

                            Bypass User Account Control

                            1
                            T1088

                            Defense Evasion

                            Modify Registry

                            6
                            T1112

                            Bypass User Account Control

                            1
                            T1088

                            Disabling Security Tools

                            3
                            T1089

                            Discovery

                            System Information Discovery

                            3
                            T1082

                            Query Registry

                            1
                            T1012

                            Peripheral Device Discovery

                            1
                            T1120

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\0F7465D4_Rar\50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
                              MD5

                              2915b3f8b703eb744fc54c81f4a9c67f

                              SHA1

                              e10361a11f8a7f232ac3cb2125c1875a0a69a3e4

                              SHA256

                              9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507

                              SHA512

                              84e53163c255edde6a0f2289b67166ad8c4f3e2b06e92b7d9dd3d8701a58b4c6f6c661be0c9f0777677bcd36de0a7cccc6512d953c4ba12d8b5c6a35617f3816

                            • C:\Users\Admin\AppData\Roaming\TempoRX\VID001.exe
                              MD5

                              921379bd587ab29da4dc23fb9d47fe36

                              SHA1

                              e9db1731731503a81a2fdc67ffa005e6aa2a8038

                              SHA256

                              50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6

                              SHA512

                              90211127d4dd83619bf42a1ab1f5d78d1a9f8ab7767704b19432d681807b636cf2bfbeb5ae97e25b57071e2a04f3b13e5a3f28b69d392b94f7ac0b3015ff38fc

                            • C:\Users\Admin\AppData\Roaming\TempoRX\VID001.exe
                              MD5

                              921379bd587ab29da4dc23fb9d47fe36

                              SHA1

                              e9db1731731503a81a2fdc67ffa005e6aa2a8038

                              SHA256

                              50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6

                              SHA512

                              90211127d4dd83619bf42a1ab1f5d78d1a9f8ab7767704b19432d681807b636cf2bfbeb5ae97e25b57071e2a04f3b13e5a3f28b69d392b94f7ac0b3015ff38fc

                            • C:\Windows\SYSTEM.INI
                              MD5

                              4ff1673719b6751e9cfee33b3fce780c

                              SHA1

                              3fc0077f91e782bf7bb2d099134ddc5c994b195f

                              SHA256

                              99c5e0f80dd204e02469571ccf428e26521d789c5b0dbe21fd670538807dfc0e

                              SHA512

                              12a8513c14559394f9d19627ac739bb75c069d198765e1f1089e0ad4ae7bd27a3e3df92b7e3d0d21c161d62772a7af905442d98c343e0410ceb9d84ccc88e983

                            • \Users\Admin\AppData\Local\Temp\nsm70A3.tmp\inetc.dll
                              MD5

                              d7a3fa6a6c738b4a3c40d5602af20b08

                              SHA1

                              34fc75d97f640609cb6cadb001da2cb2c0b3538a

                              SHA256

                              67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

                              SHA512

                              75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

                            • \Users\Admin\AppData\Local\Temp\nsm70A3.tmp\inetc.dll
                              MD5

                              d7a3fa6a6c738b4a3c40d5602af20b08

                              SHA1

                              34fc75d97f640609cb6cadb001da2cb2c0b3538a

                              SHA256

                              67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

                              SHA512

                              75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

                            • memory/1176-2-0x00000000022F0000-0x000000000337E000-memory.dmp
                              Filesize

                              16.6MB

                            • memory/1176-3-0x0000000002170000-0x0000000002172000-memory.dmp
                              Filesize

                              8KB

                            • memory/1176-4-0x00000000022D0000-0x00000000022D1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3660-5-0x0000000000000000-mapping.dmp
                            • memory/3660-11-0x0000000002290000-0x000000000331E000-memory.dmp
                              Filesize

                              16.6MB

                            • memory/3660-13-0x0000000004550000-0x0000000004551000-memory.dmp
                              Filesize

                              4KB