Resubmissions

15-04-2021 19:10

210415-w74xxxq3ts 10

15-04-2021 19:06

210415-7qwvfw5l22 10

Analysis

  • max time kernel
    141s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    15-04-2021 19:10

General

  • Target

    1234.exe

  • Size

    1.2MB

  • MD5

    45de46aae024150078e249dec173a337

  • SHA1

    bd1f8891836765f1c58777806cb82657b8c3bd7e

  • SHA256

    554ac14fb25de9add3d66f0877a7da079bf6818a4957a21b2a618c6aac22b6c4

  • SHA512

    2bb1d4d1908cc2534677f32861dd0185c2907508112d05434d731088a62f9f28071e8652111c2745dad28d4334c696471dc358ca9537b08e390157d5502def24

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\1234.exe
        "C:\Users\Admin\AppData\Local\Temp\1234.exe"
        2⤵
          PID:2576
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 764
            3⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2860
        • C:\Windows\system32\SystemSettingsAdminFlows.exe
          "C:\Windows\system32\SystemSettingsAdminFlows.exe" SetDateTime
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2632
        • C:\Users\Admin\AppData\Local\Temp\1234.exe
          "C:\Users\Admin\AppData\Local\Temp\1234.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SystemLanguageDriverver2.31" /tr '"C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3856
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "SystemLanguageDriverver2.31" /tr '"C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe"'
              4⤵
              • Creates scheduled task(s)
              PID:3084
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC65E.tmp.bat""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              4⤵
              • Delays execution with timeout.exe
              PID:3948
            • C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe
              "C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe"
              4⤵
              • Executes dropped EXE
              PID:2088
      • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
        "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2592
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1580
        • C:\Windows\System32\DataExchangeHost.exe
          C:\Windows\System32\DataExchangeHost.exe -Embedding
          1⤵
            PID:2168
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localservice -s W32Time
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3560

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe
            MD5

            3bb7e35f9098351c3cf6cc8417e6cf3b

            SHA1

            bfa3e29b35548c98465f374509c8fc5969b37b97

            SHA256

            afd8d9375f6f76f954edea2ef7b26177eafe16b96d6e528d6ccafbb94a03247b

            SHA512

            8546fbd24bb0541835304eb1c8876084daabff8677c0d8054463924e10ba74abd51dd0ab792cbae4e1e2b9d9025b6f6a94ec72faf74a9a7036dc0ae535aaef4b

          • C:\Users\Admin\AppData\Local\Temp\System Language Driver ver 2.31\SystemLanguageDriverver2.31.exe
            MD5

            80f956a6de8142c867c8d1f9feb35bb5

            SHA1

            7a34bb6fcc9d710b193f994749a31bb9f69d48e5

            SHA256

            64447228b8a066a79ab4dac4a46feef17c9f6e36d4e0f3787227fddaa9e2146c

            SHA512

            805f50373b128e19d6abc0146185b77623b498398e33a002db6e41a79e88a69fee2f693c47347f4cff2e22ebf2743b51deecf6f3c4d919af7d7796ac1615c5e2

          • C:\Users\Admin\AppData\Local\Temp\tmpC65E.tmp.bat
            MD5

            92e4c39d9b1e487223518ef06140aa40

            SHA1

            266a930267adfa7d9d960c2842eacca1b8ddfbc7

            SHA256

            5b0b72750590647bac6a3b9574a5a0e3615d49cbde292a7bd0c33999c9e240d3

            SHA512

            ab4bfa8aa2ed3ad5505f624c86f3e04e75ecf4affc94befd53630512fb569e07a42843dd39794a596c2242acaa8c439d02cb995da61987a7817136220b9ad55a

          • memory/1944-119-0x00000000055E0000-0x00000000055E1000-memory.dmp
            Filesize

            4KB

          • memory/1944-122-0x00000000364D0000-0x00000000364D1000-memory.dmp
            Filesize

            4KB

          • memory/2088-126-0x0000000000000000-mapping.dmp
          • memory/2088-131-0x0000000001590000-0x0000000001591000-memory.dmp
            Filesize

            4KB

          • memory/2576-114-0x0000000000FC0000-0x0000000000FC1000-memory.dmp
            Filesize

            4KB

          • memory/2632-116-0x0000000000000000-mapping.dmp
          • memory/2660-123-0x0000000000000000-mapping.dmp
          • memory/3084-121-0x0000000000000000-mapping.dmp
          • memory/3856-120-0x0000000000000000-mapping.dmp
          • memory/3948-125-0x0000000000000000-mapping.dmp