Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-05-2021 02:22

General

  • Target

    de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248.exe

  • Size

    231KB

  • MD5

    6b699598d9b88107f16ea4977a39dd2c

  • SHA1

    28ae2c9fe6ae8ca1e891d32094e159684363cef1

  • SHA256

    de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

  • SHA512

    668ca675242b843f7781df225c4156b2b7722b7f7a5afe9233e45ff587546ac5d35f282f43fc518228ae7591290f4bb0da5aada839bcfe1ee255f98c694d0050

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 36 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248.exe
    "C:\Users\Admin\AppData\Local\Temp\de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\$Recycle.Bin\SKP.EXE
      C:\$Recycle.Bin\SKP.EXE
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      PID:2032

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\SKP.EXE
    MD5

    c0af04427381d5d5c8f5cac417779f82

    SHA1

    c3aaeaf828772e30dd90cc9172e664b6b7e8b0ee

    SHA256

    ebee22918c0c0755eb41ef14626709e40b0be187404a475a4b681dff34fb8fc6

    SHA512

    16e48191ddd04cb7c2ee240b525d2ecb27443d9e7a3819594f269e4dbb82fde891779cbd0c55ae50b822b83dbc492ee15fe702e4fb2e651865e29eeef50b5612

  • C:\$Recycle.Bin\SKP.EXE
    MD5

    c0af04427381d5d5c8f5cac417779f82

    SHA1

    c3aaeaf828772e30dd90cc9172e664b6b7e8b0ee

    SHA256

    ebee22918c0c0755eb41ef14626709e40b0be187404a475a4b681dff34fb8fc6

    SHA512

    16e48191ddd04cb7c2ee240b525d2ecb27443d9e7a3819594f269e4dbb82fde891779cbd0c55ae50b822b83dbc492ee15fe702e4fb2e651865e29eeef50b5612

  • \$Recycle.Bin\SKP.EXE
    MD5

    c0af04427381d5d5c8f5cac417779f82

    SHA1

    c3aaeaf828772e30dd90cc9172e664b6b7e8b0ee

    SHA256

    ebee22918c0c0755eb41ef14626709e40b0be187404a475a4b681dff34fb8fc6

    SHA512

    16e48191ddd04cb7c2ee240b525d2ecb27443d9e7a3819594f269e4dbb82fde891779cbd0c55ae50b822b83dbc492ee15fe702e4fb2e651865e29eeef50b5612

  • \$Recycle.Bin\SKP.EXE
    MD5

    c0af04427381d5d5c8f5cac417779f82

    SHA1

    c3aaeaf828772e30dd90cc9172e664b6b7e8b0ee

    SHA256

    ebee22918c0c0755eb41ef14626709e40b0be187404a475a4b681dff34fb8fc6

    SHA512

    16e48191ddd04cb7c2ee240b525d2ecb27443d9e7a3819594f269e4dbb82fde891779cbd0c55ae50b822b83dbc492ee15fe702e4fb2e651865e29eeef50b5612

  • memory/1096-65-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/2032-62-0x0000000000000000-mapping.dmp
  • memory/2032-66-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB