Analysis

  • max time kernel
    2s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 02:04

General

  • Target

    daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef.exe

  • Size

    36KB

  • MD5

    8ef0778cfb358be6b7d9b25104ad9e87

  • SHA1

    48fa290678c95010bcf198fdc2d4cb3d485b37c5

  • SHA256

    daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

  • SHA512

    1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef.exe
    "C:\Users\Admin\AppData\Local\Temp\daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\cmd.exe
      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1220
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\PING.EXE
        PING 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:1796
      • C:\Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe
        "C:\Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies WinLogon
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Windows\SysWOW64\cmd.exe
          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:788
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • Modifies registry key
            PID:660
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
            PID:1892

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • C:\Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • C:\Users\Admin\AppData\Local\Temp\install.bat

      MD5

      15711be021933dd8289ed3d9c5accc04

      SHA1

      ecf1957d52f74195041ecdca2420b40a18179bf3

      SHA256

      07ae23157efa3108e56aed1de41a0f0c43377e615279a3fc82ad4f13d90a89ad

      SHA512

      74a69edff6685ddd13bcf2c0b0cb3219793df98e3753b950bd180ec8888b7efd046bee8f80393c2d8b6a43ba5cfd58da4bd1d6dee035a52ee74fe382ab74e14d

    • \Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • \Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • \Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • \Users\Admin\AppData\Local\Temp\adobe\adobeupdate.exe

      MD5

      8ef0778cfb358be6b7d9b25104ad9e87

      SHA1

      48fa290678c95010bcf198fdc2d4cb3d485b37c5

      SHA256

      daf29c624693210dcf0743b0e31c273d181936beb0d09c58660b5241efc737ef

      SHA512

      1e49f8e39d3b6d2a3c346f69abc42a5e2b824674a953c4ec6997b8c54827c2c5dea31857ec7b04e60e965f337e0e52cc85acd1d279fbfe1813b84271e075c1f1

    • memory/468-67-0x0000000000000000-mapping.dmp

    • memory/468-80-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/660-78-0x0000000000000000-mapping.dmp

    • memory/788-73-0x0000000000000000-mapping.dmp

    • memory/1220-61-0x0000000000000000-mapping.dmp

    • memory/1484-60-0x0000000000000000-mapping.dmp

    • memory/1652-59-0x0000000075561000-0x0000000075563000-memory.dmp

      Filesize

      8KB

    • memory/1796-64-0x0000000000000000-mapping.dmp

    • memory/1892-74-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1892-76-0x00000000004192EC-mapping.dmp

    • memory/1972-62-0x0000000000000000-mapping.dmp