Analysis

  • max time kernel
    22s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    17-06-2021 07:20

General

  • Target

    Proforma.exe

  • Size

    4KB

  • MD5

    c57cea8db447cb9bec608f939026bd86

  • SHA1

    e48f6b38215a9b26a31901c67d93da244ad1a546

  • SHA256

    c66e973686ee6d1761be2781a9f27f0f8d81fad4db088d836bebf6055cba193f

  • SHA512

    bae53eba4576b0d0ad261e1c79916a06c8a70e7545609c65ece25d6c6bb7c8eccbbedc1aa7a368e4ff310e2315c8d2b67d053c09c97eb07ae7a27653b939f4c0

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Detects Pyinstaller 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Proforma.exe
    "C:\Users\Admin\AppData\Local\Temp\Proforma.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tg.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\tg.exe
        C:\Users\Admin\AppData\Local\Temp\tg.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Users\Admin\AppData\Local\Temp\tg.exe
          C:\Users\Admin\AppData\Local\Temp\tg.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1464
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Proforma.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1492
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:640

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI16322\python39.dll
      MD5

      7fd9240404f3d2c7dc76414e128ee16c

      SHA1

      143217da693fbb23bb8dce1cc12fc68d5a35a091

      SHA256

      803cb2119787f7a4d966dfb0f992729dd2df91e272f87393c3186f190adcb068

      SHA512

      c1f492cf8edcf0c6327261c320f205e098ccd8418a4a905df9fa4a1861eb08a222337adee39d9a25c1289b2fdd1b19d767e96ca5961210ade223cc360403d61e

    • C:\Users\Admin\AppData\Local\Temp\tg.exe
      MD5

      a3533b0da7c92a24237c55110538ab0b

      SHA1

      2f25940be4d94a4d777547dd13bbc0d27361777a

      SHA256

      c565e73940b7ca256d951bf65b1f3cd8fb79f3a9c6125a64efd3d1a89a21f7c7

      SHA512

      9580b0e134ce64e907e192c988a03a0a4cb23a92de2c3a4d656485fe8b815dd7cac2ccfc1fd9b2f0864f97c58f2586719c14e3b455f4a2048b398d3d653c08ac

    • C:\Users\Admin\AppData\Local\Temp\tg.exe
      MD5

      a3533b0da7c92a24237c55110538ab0b

      SHA1

      2f25940be4d94a4d777547dd13bbc0d27361777a

      SHA256

      c565e73940b7ca256d951bf65b1f3cd8fb79f3a9c6125a64efd3d1a89a21f7c7

      SHA512

      9580b0e134ce64e907e192c988a03a0a4cb23a92de2c3a4d656485fe8b815dd7cac2ccfc1fd9b2f0864f97c58f2586719c14e3b455f4a2048b398d3d653c08ac

    • C:\Users\Admin\AppData\Local\Temp\tg.exe
      MD5

      a3533b0da7c92a24237c55110538ab0b

      SHA1

      2f25940be4d94a4d777547dd13bbc0d27361777a

      SHA256

      c565e73940b7ca256d951bf65b1f3cd8fb79f3a9c6125a64efd3d1a89a21f7c7

      SHA512

      9580b0e134ce64e907e192c988a03a0a4cb23a92de2c3a4d656485fe8b815dd7cac2ccfc1fd9b2f0864f97c58f2586719c14e3b455f4a2048b398d3d653c08ac

    • \Users\Admin\AppData\Local\Temp\_MEI16322\python39.dll
      MD5

      7fd9240404f3d2c7dc76414e128ee16c

      SHA1

      143217da693fbb23bb8dce1cc12fc68d5a35a091

      SHA256

      803cb2119787f7a4d966dfb0f992729dd2df91e272f87393c3186f190adcb068

      SHA512

      c1f492cf8edcf0c6327261c320f205e098ccd8418a4a905df9fa4a1861eb08a222337adee39d9a25c1289b2fdd1b19d767e96ca5961210ade223cc360403d61e

    • \Users\Admin\AppData\Local\Temp\tg.exe
      MD5

      a3533b0da7c92a24237c55110538ab0b

      SHA1

      2f25940be4d94a4d777547dd13bbc0d27361777a

      SHA256

      c565e73940b7ca256d951bf65b1f3cd8fb79f3a9c6125a64efd3d1a89a21f7c7

      SHA512

      9580b0e134ce64e907e192c988a03a0a4cb23a92de2c3a4d656485fe8b815dd7cac2ccfc1fd9b2f0864f97c58f2586719c14e3b455f4a2048b398d3d653c08ac

    • memory/524-64-0x0000000000000000-mapping.dmp
    • memory/640-66-0x0000000000000000-mapping.dmp
    • memory/1208-60-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/1208-62-0x000000001AA40000-0x000000001AA42000-memory.dmp
      Filesize

      8KB

    • memory/1368-63-0x0000000000000000-mapping.dmp
    • memory/1464-71-0x0000000000000000-mapping.dmp
    • memory/1492-65-0x0000000000000000-mapping.dmp
    • memory/1632-68-0x0000000000000000-mapping.dmp