Analysis

  • max time kernel
    13s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-06-2021 12:06

General

  • Target

    mvs.exe

  • Size

    476KB

  • MD5

    faf25564825a05a4c01870cdc0535525

  • SHA1

    54d7f92637e31e4c1aed0a58b690d7d99886c380

  • SHA256

    82732e47492148243ee3fb338c93d43b9a9984f39e3409327600cffc5766af1b

  • SHA512

    b44be2421a074ea986336b0c179a6d416c845ae44b4ca67d31594506bd79a3fdfa2907d7bcf7b3c46f1d942e0b057fbd8bce3a02bceb5bf91e1e70c30a57f0db

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mvs.exe
    "C:\Users\Admin\AppData\Local\Temp\mvs.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\windows\temp\a.exe
      "C:\windows\temp\a.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2773.tmp\a.bat" "C:\windows\temp\a.exe""
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3740
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo /fo list
          4⤵
          • Gathers system information
          PID:584
        • C:\Windows\SysWOW64\find.exe
          Find /i "OS Name: "
          4⤵
            PID:3608
          • C:\Windows\SysWOW64\find.exe
            Find /i "OS Version: "
            4⤵
              PID:1332
            • C:\Windows\SysWOW64\find.exe
              Find /i "System Model:"
              4⤵
                PID:804
              • C:\Windows\SysWOW64\find.exe
                Find /i "System Manufacturer: "
                4⤵
                  PID:2236
                • C:\Windows\SysWOW64\find.exe
                  Find /i "BIOS Version:"
                  4⤵
                    PID:2180
                  • C:\Windows\SysWOW64\find.exe
                    Find /i "Total Physical Memory: "
                    4⤵
                      PID:1468
                    • C:\Windows\SysWOW64\find.exe
                      Find /i "Time Zone:"
                      4⤵
                        PID:3860
                      • C:\Windows\SysWOW64\find.exe
                        Find /i "DHCP Server:"
                        4⤵
                          PID:2380
                        • C:\Windows\SysWOW64\find.exe
                          Find /i "Connection Name:"
                          4⤵
                            PID:1912
                          • C:\Windows\SysWOW64\find.exe
                            Find /i "Original Install Date: "
                            4⤵
                              PID:2120
                            • C:\Windows\SysWOW64\reg.exe
                              reg query HKLM\Hardware\Description\System\CentralProcessor\0 /v Identifier
                              4⤵
                              • Checks processor information in registry
                              • Modifies registry key
                              PID:3936
                            • C:\Windows\SysWOW64\find.exe
                              Find /i "x86"
                              4⤵
                                PID:4024
                              • C:\Windows\SysWOW64\getmac.exe
                                getmac /nh
                                4⤵
                                  PID:3500
                                • C:\Windows\SysWOW64\reg.exe
                                  Reg query "HKEY_CLASSES_ROOT\http\shell\open\command" /ve
                                  4⤵
                                    PID:204
                                  • C:\Windows\SysWOW64\findstr.exe
                                    Findstr /i "Program Files" c:\windows\temp\c.txt
                                    4⤵
                                      PID:3928
                                    • C:\Windows\SysWOW64\reg.exe
                                      Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion
                                      4⤵
                                        PID:3968
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion
                                        4⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:2184
                                        • C:\Windows\SysWOW64\reg.exe
                                          Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion
                                          5⤵
                                            PID:3996
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion
                                          4⤵
                                            PID:3108
                                            • C:\Windows\SysWOW64\reg.exe
                                              Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion
                                              5⤵
                                                PID:1436
                                            • C:\Windows\SysWOW64\reg.exe
                                              Reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player Plugin" /v DisplayVersion
                                              4⤵
                                                PID:1364
                                              • C:\Windows\SysWOW64\findstr.exe
                                                Findstr /i "REG_SZ" c:\windows\temp\123.txt
                                                4⤵
                                                  PID:2840
                                                • C:\Windows\SysWOW64\reg.exe
                                                  reg query "HKLM\SOFTWARE\Adobe\Acrobat Reader"
                                                  4⤵
                                                    PID:2628
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Plug-in"
                                                    4⤵
                                                      PID:3180
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      Findstr /i "1" c:\windows\temp\123.txt
                                                      4⤵
                                                        PID:2072
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" ver "
                                                        4⤵
                                                          PID:428
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr /i "5\.1\."
                                                          4⤵
                                                            PID:3744
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "STATE"
                                                            4⤵
                                                              PID:3588
                                                              • C:\Windows\SysWOW64\sc.exe
                                                                sc query mpssvc
                                                                5⤵
                                                                  PID:3060
                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                  findstr /i "STATE"
                                                                  5⤵
                                                                    PID:1832
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "installed"
                                                                  4⤵
                                                                    PID:192
                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                      sc query mpssvc
                                                                      5⤵
                                                                        PID:944
                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                        findstr /i "installed"
                                                                        5⤵
                                                                          PID:3500
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "STATE"
                                                                        4⤵
                                                                          PID:1208
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            sc query wuauserv
                                                                            5⤵
                                                                              PID:1204
                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                              findstr /i "STATE"
                                                                              5⤵
                                                                                PID:348
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "installed"
                                                                              4⤵
                                                                                PID:1016
                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                  sc query wuauserv
                                                                                  5⤵
                                                                                    PID:2112
                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                    findstr /i "installed"
                                                                                    5⤵
                                                                                      PID:356
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "STATE"
                                                                                    4⤵
                                                                                      PID:2844
                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                        sc query wscsvc
                                                                                        5⤵
                                                                                          PID:2836
                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                          findstr /i "STATE"
                                                                                          5⤵
                                                                                            PID:3980
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "installed"
                                                                                          4⤵
                                                                                            PID:2480
                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                              sc query wscsvc
                                                                                              5⤵
                                                                                                PID:2660
                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                findstr /i "installed"
                                                                                                5⤵
                                                                                                  PID:2380
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "STATE"
                                                                                                4⤵
                                                                                                  PID:3772
                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                    sc query msiserver
                                                                                                    5⤵
                                                                                                      PID:428
                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                      findstr /i "STATE"
                                                                                                      5⤵
                                                                                                        PID:212
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "installed"
                                                                                                      4⤵
                                                                                                        PID:188
                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                          sc query msiserver
                                                                                                          5⤵
                                                                                                            PID:1832
                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                            findstr /i "installed"
                                                                                                            5⤵
                                                                                                              PID:3404
                                                                                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\windows\temp\Report.txt
                                                                                                            4⤵
                                                                                                            • Opens file in notepad (likely ransom note)
                                                                                                            PID:804

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v6

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads