Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    09-05-2021 00:43

General

  • Target

    e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe

  • Size

    1.6MB

  • MD5

    9b7eac5bd1fee50966a3b444ee80b342

  • SHA1

    620bf8b1391c05126a59f9b04f54fb4fbe5d6036

  • SHA256

    e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44

  • SHA512

    cdf632ed79ee1ad15c1c13d357596b8008fe7cb5b2b295237af6f4f3033ebabacc97973a447ce246f44430b6b8b5adff1a95905ec9f322e91d47b2ba92e1c3fe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe
    "C:\Users\Admin\AppData\Local\Temp\e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\._cache_e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Users\Admin\AppData\Local\TempSetup.exe
        "C:\Users\Admin\AppData\Local\TempSetup.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe
          "C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4184
      • C:\Users\Admin\AppData\Local\TempSetup.exe
        "C:\Users\Admin\AppData\Local\TempSetup.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Users\Admin\AppData\Local\Temp\~TSP_Dork_generator_v_15_0.exe
        "C:\Users\Admin\AppData\Local\Temp\~TSP_Dork_generator_v_15_0.exe"
        3⤵
        • Executes dropped EXE
        PID:3116
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:5060

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    15c37b29b6170fb154d18749115b94ec

    SHA1

    a7c1a1dcababa9fdc88c14cbdbbac1b7f33d4d3e

    SHA256

    86c9fd53c68f00b586fdc12c37596d427a06b2ac36081e5132486b3a5ae3bb54

    SHA512

    2b88231b43510700118d7a648e67df80bd87baf1b0432fafdaa517f271032ae4baf3b463ef52c950eff2e160840a43bb1a1df7bcc54313c64fb4e4dc97138622

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    15c37b29b6170fb154d18749115b94ec

    SHA1

    a7c1a1dcababa9fdc88c14cbdbbac1b7f33d4d3e

    SHA256

    86c9fd53c68f00b586fdc12c37596d427a06b2ac36081e5132486b3a5ae3bb54

    SHA512

    2b88231b43510700118d7a648e67df80bd87baf1b0432fafdaa517f271032ae4baf3b463ef52c950eff2e160840a43bb1a1df7bcc54313c64fb4e4dc97138622

  • C:\Users\Admin\AppData\Local\TempSetup.exe
    MD5

    1d26acfd119d4f1122588a421765ff3c

    SHA1

    2bc59f88356862633afaa75b26eb9d5febd9f9e9

    SHA256

    b999d0bde7c191f8897a9f5657c0c171320845669a2483e52df8ab09cf2d5421

    SHA512

    4da04e0cd1266c0a975319fadd16442093d01b72a074819913a398c0f85f8a4b54191c225455759cfa5d6ff5e133ebd415611c975b9af019eda15beff2c33dac

  • C:\Users\Admin\AppData\Local\TempSetup.exe
    MD5

    1d26acfd119d4f1122588a421765ff3c

    SHA1

    2bc59f88356862633afaa75b26eb9d5febd9f9e9

    SHA256

    b999d0bde7c191f8897a9f5657c0c171320845669a2483e52df8ab09cf2d5421

    SHA512

    4da04e0cd1266c0a975319fadd16442093d01b72a074819913a398c0f85f8a4b54191c225455759cfa5d6ff5e133ebd415611c975b9af019eda15beff2c33dac

  • C:\Users\Admin\AppData\Local\TempSetup.exe
    MD5

    1d26acfd119d4f1122588a421765ff3c

    SHA1

    2bc59f88356862633afaa75b26eb9d5febd9f9e9

    SHA256

    b999d0bde7c191f8897a9f5657c0c171320845669a2483e52df8ab09cf2d5421

    SHA512

    4da04e0cd1266c0a975319fadd16442093d01b72a074819913a398c0f85f8a4b54191c225455759cfa5d6ff5e133ebd415611c975b9af019eda15beff2c33dac

  • C:\Users\Admin\AppData\Local\Temp\._cache_e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe
    MD5

    1e492acc3fada41dbade170550fa827f

    SHA1

    475f04705b725d445382988d6443a6490af93c17

    SHA256

    fb1e10eff8178b1fed9c14a4a76c3dd5736ba2879fd7f0160e485d931925c6d1

    SHA512

    475180ebd1057622f446b32e2a64541d2fec46897fd14a74cc27037f0102fe130418afd968929d7cf724ff7c109617c01080099f457eb6ec962fe2aa69a07dec

  • C:\Users\Admin\AppData\Local\Temp\._cache_e03a774e6c8c69da4c1924626d42581376d13f63e4b0600d926bec8f083aac44.exe
    MD5

    1e492acc3fada41dbade170550fa827f

    SHA1

    475f04705b725d445382988d6443a6490af93c17

    SHA256

    fb1e10eff8178b1fed9c14a4a76c3dd5736ba2879fd7f0160e485d931925c6d1

    SHA512

    475180ebd1057622f446b32e2a64541d2fec46897fd14a74cc27037f0102fe130418afd968929d7cf724ff7c109617c01080099f457eb6ec962fe2aa69a07dec

  • C:\Users\Admin\AppData\Local\Temp\~TSP_Dork_generator_v_15_0.exe
    MD5

    59e02b754902f1d61d67e386db256590

    SHA1

    0acf056d3a4ed2a02e4769914eb6bef050f6b7f1

    SHA256

    a97419010956d614699f565b4f8a78c34c184638a8ed03d83017c6db76da2806

    SHA512

    d356cc5e360ad0dfb0f39d5459209d60ce38102fbae2fd2fbed037b89af211b90dabe29087c2d5990a0ed40773c8ce2f6c1f8fff9d81349eecdbf775e29d3b88

  • C:\Users\Admin\AppData\Local\Temp\~TSP_Dork_generator_v_15_0.exe
    MD5

    59e02b754902f1d61d67e386db256590

    SHA1

    0acf056d3a4ed2a02e4769914eb6bef050f6b7f1

    SHA256

    a97419010956d614699f565b4f8a78c34c184638a8ed03d83017c6db76da2806

    SHA512

    d356cc5e360ad0dfb0f39d5459209d60ce38102fbae2fd2fbed037b89af211b90dabe29087c2d5990a0ed40773c8ce2f6c1f8fff9d81349eecdbf775e29d3b88

  • C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\server.zip
    MD5

    d03d2f9693d89efc80c6e8117149e140

    SHA1

    df3651d494e8f51ff802a047b86ece929c1bd4d1

    SHA256

    208b8c399265533130e67ffb9a2daa6970ff5f94375c9cbad6e3bf1cb6c224a4

    SHA512

    98218447f9ecc985ba494540cd38003d6a5bc14b141676d86b762e0e35faa7373aa711811a430117a385b01f561e3ce26e64ecbcce86dbf832c7d0ed03db79f6

  • C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe
    MD5

    248b2767cad501ee9927da00c80f3c26

    SHA1

    c948475d1b44a737370d9068312b0ee7c323ecb2

    SHA256

    5de29b1fd0d3452ede3264c156342c18115eb076138330eae8ab2b984c8e75fd

    SHA512

    e25341c8aedda93525cd79f6c52e45c4060e378bf42ac6ce3aefe15417daa081f410ac0f9f818edcbd95e1d555bef9472be37e7d73f30de05025990fd1850cb8

  • C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe
    MD5

    248b2767cad501ee9927da00c80f3c26

    SHA1

    c948475d1b44a737370d9068312b0ee7c323ecb2

    SHA256

    5de29b1fd0d3452ede3264c156342c18115eb076138330eae8ab2b984c8e75fd

    SHA512

    e25341c8aedda93525cd79f6c52e45c4060e378bf42ac6ce3aefe15417daa081f410ac0f9f818edcbd95e1d555bef9472be37e7d73f30de05025990fd1850cb8

  • C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe
    MD5

    248b2767cad501ee9927da00c80f3c26

    SHA1

    c948475d1b44a737370d9068312b0ee7c323ecb2

    SHA256

    5de29b1fd0d3452ede3264c156342c18115eb076138330eae8ab2b984c8e75fd

    SHA512

    e25341c8aedda93525cd79f6c52e45c4060e378bf42ac6ce3aefe15417daa081f410ac0f9f818edcbd95e1d555bef9472be37e7d73f30de05025990fd1850cb8

  • memory/3116-135-0x000001EC53E70000-0x000001EC53E72000-memory.dmp
    Filesize

    8KB

  • memory/3116-137-0x000001EC53E72000-0x000001EC53E74000-memory.dmp
    Filesize

    8KB

  • memory/3116-130-0x0000000000000000-mapping.dmp
  • memory/3116-133-0x000001EC39880000-0x000001EC39881000-memory.dmp
    Filesize

    4KB

  • memory/3304-121-0x0000000000000000-mapping.dmp
  • memory/3304-138-0x0000000000FA2000-0x0000000000FA4000-memory.dmp
    Filesize

    8KB

  • memory/3304-129-0x0000000000FA0000-0x0000000000FA2000-memory.dmp
    Filesize

    8KB

  • memory/3940-128-0x0000000000C30000-0x0000000000C32000-memory.dmp
    Filesize

    8KB

  • memory/3940-136-0x0000000000C32000-0x0000000000C34000-memory.dmp
    Filesize

    8KB

  • memory/3940-124-0x0000000000000000-mapping.dmp
  • memory/4184-142-0x0000000000000000-mapping.dmp
  • memory/4184-144-0x0000000002802000-0x0000000002803000-memory.dmp
    Filesize

    4KB

  • memory/4432-114-0x00000000023E0000-0x00000000023E1000-memory.dmp
    Filesize

    4KB

  • memory/5020-125-0x0000000001020000-0x0000000001022000-memory.dmp
    Filesize

    8KB

  • memory/5020-115-0x0000000000000000-mapping.dmp
  • memory/5060-126-0x0000000000540000-0x000000000068A000-memory.dmp
    Filesize

    1.3MB

  • memory/5060-118-0x0000000000000000-mapping.dmp