Overview
overview
10Static
static
028d53f522...fa.exe
windows7_x64
10028d53f522...fa.exe
windows11_x64
10028d53f522...fa.exe
windows10_x64
10Bot_Checker.exe
windows7_x64
3Bot_Checker.exe
windows11_x64
10Bot_Checker.exe
windows10_x64
10Uninstall.exe
windows7_x64
3Uninstall.exe
windows11_x64
6Uninstall.exe
windows10_x64
3Versium.exe
windows7_x64
9Versium.exe
windows11_x64
10Versium.exe
windows10_x64
10VersiumRes...it.exe
windows7_x64
10VersiumRes...it.exe
windows11_x64
10VersiumRes...it.exe
windows10_x64
10VersiumRes...it.exe
windows7_x64
8VersiumRes...it.exe
windows11_x64
8VersiumRes...it.exe
windows10_x64
8Versiumresearch.exe
windows7_x64
10Versiumresearch.exe
windows11_x64
Versiumresearch.exe
windows10_x64
10Analysis
-
max time kernel
912s -
max time network
1609s -
platform
windows11_x64 -
resource
win11 -
submitted
12-08-2021 20:38
Static task
static1
Behavioral task
behavioral1
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win11
Behavioral task
behavioral3
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Bot_Checker.exe
Resource
win7v20210410
Behavioral task
behavioral5
Sample
Bot_Checker.exe
Resource
win11
Behavioral task
behavioral6
Sample
Bot_Checker.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win11
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Versium.exe
Resource
win7v20210408
Behavioral task
behavioral11
Sample
Versium.exe
Resource
win11
Behavioral task
behavioral12
Sample
Versium.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
VersiumResearch32bit.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
VersiumResearch32bit.exe
Resource
win11
Behavioral task
behavioral15
Sample
VersiumResearch32bit.exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
VersiumResearch64bit.exe
Resource
win7v20210408
Behavioral task
behavioral17
Sample
VersiumResearch64bit.exe
Resource
win11
Behavioral task
behavioral18
Sample
VersiumResearch64bit.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Versiumresearch.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Versiumresearch.exe
Resource
win11
Behavioral task
behavioral21
Sample
Versiumresearch.exe
Resource
win10v20210410
General
-
Target
Uninstall.exe
-
Size
97KB
-
MD5
a8c53399726fea24e4af993e971df5af
-
SHA1
50b4c4d3cf172106417dc0e59eaa63bf7cd0603e
-
SHA256
6b13a733947bc2395695cc6f9a8b59eae88cf6467e368a810bcac0c10d6c46a6
-
SHA512
b2159712ecfa8f7e9a75a190e858cc791bcdcd19118a6db40041d7ffbda531343a63244d35012702dda8514191e8bf6e838ab896c9db232f2c163fc4d4cd2bf9
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\D: svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
svchost.exedescription ioc process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdp svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdp.override svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.sst svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MoUsoCoreWorker.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MoUsoCoreWorker.exe -
Modifies data under HKEY_USERS 48 IoCs
Processes:
sihclient.exesvchost.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Uninstall svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exeMoUsoCoreWorker.exedescription pid process Token: SeSystemEnvironmentPrivilege 3636 svchost.exe Token: SeShutdownPrivilege 884 MoUsoCoreWorker.exe Token: SeCreatePagefilePrivilege 884 MoUsoCoreWorker.exe Token: SeShutdownPrivilege 884 MoUsoCoreWorker.exe Token: SeCreatePagefilePrivilege 884 MoUsoCoreWorker.exe Token: SeShutdownPrivilege 884 MoUsoCoreWorker.exe Token: SeCreatePagefilePrivilege 884 MoUsoCoreWorker.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Uninstall.exesvchost.exesvchost.exedescription pid process target process PID 4972 wrote to memory of 3048 4972 Uninstall.exe Uninstall.exe PID 4972 wrote to memory of 3048 4972 Uninstall.exe Uninstall.exe PID 4972 wrote to memory of 3048 4972 Uninstall.exe Uninstall.exe PID 4864 wrote to memory of 720 4864 svchost.exe pcaui.exe PID 4864 wrote to memory of 720 4864 svchost.exe pcaui.exe PID 3796 wrote to memory of 2092 3796 svchost.exe mpcmdrun.exe PID 3796 wrote to memory of 2092 3796 svchost.exe mpcmdrun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe" end2⤵PID:3048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv yKasnM7UgUqICmWI3CBItg.0.21⤵
- Modifies data under HKEY_USERS
PID:4628
-
C:\Windows\system32\wlrmdr.exe-c -s 0 -f 0 -t Empty -m Empty -a 0 -u Empty1⤵PID:4880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\System32\pcaui.exeC:\Windows\System32\pcaui.exe -n 0 -a "" -v "" -g "" -x ""2⤵PID:720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
PID:4896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc1⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable2⤵PID:2092
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/720-150-0x0000000000000000-mapping.dmp
-
memory/1288-147-0x000002A1CCE70000-0x000002A1CCE80000-memory.dmpFilesize
64KB
-
memory/1288-148-0x000002A1CCEF0000-0x000002A1CCF00000-memory.dmpFilesize
64KB
-
memory/1288-149-0x000002A1CF4F0000-0x000002A1CF4F4000-memory.dmpFilesize
16KB
-
memory/1288-152-0x000002A1CF7E0000-0x000002A1CF7E4000-memory.dmpFilesize
16KB
-
memory/1288-153-0x000002A1CF7A0000-0x000002A1CF7A1000-memory.dmpFilesize
4KB
-
memory/1288-154-0x000002A1CF520000-0x000002A1CF524000-memory.dmpFilesize
16KB
-
memory/1288-155-0x000002A1CF510000-0x000002A1CF511000-memory.dmpFilesize
4KB
-
memory/1288-156-0x000002A1CF510000-0x000002A1CF514000-memory.dmpFilesize
16KB
-
memory/1288-157-0x000002A1CD1F0000-0x000002A1CD1F1000-memory.dmpFilesize
4KB
-
memory/2092-151-0x0000000000000000-mapping.dmp
-
memory/3048-146-0x0000000000000000-mapping.dmp