Analysis
-
max time kernel
8s -
max time network
9s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
25-08-2021 09:56
Static task
static1
Behavioral task
behavioral1
Sample
therapeutic-rule.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
therapeutic-rule.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
therapeutic-rule.exe
-
Size
170KB
-
MD5
fc080fae536e8801a2f3400804f2734b
-
SHA1
0d79a4ebbc04b7abc268b76068335e0dd581abb4
-
SHA256
8a33e2792e0d41c6b99a1203187f650fa16a7a0c187938457bc526526f13b5c2
-
SHA512
0fc4740cd0601d2b382625a940e3d68479fca6fefefd5421b7c72a9739d0ee3676c3278866a7eb1aec49dc3102ea712fa40f11fcb33f5e7b4c784d3ae14ccd01
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\therapeutic-rule.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
therapeutic-rule.exepid process 804 therapeutic-rule.exe 804 therapeutic-rule.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
therapeutic-rule.exedescription pid process Token: SeDebugPrivilege 804 therapeutic-rule.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
therapeutic-rule.execmd.exedescription pid process target process PID 804 wrote to memory of 3700 804 therapeutic-rule.exe cmd.exe PID 804 wrote to memory of 3700 804 therapeutic-rule.exe cmd.exe PID 804 wrote to memory of 2348 804 therapeutic-rule.exe sihost.exe PID 3700 wrote to memory of 3592 3700 cmd.exe reg.exe PID 3700 wrote to memory of 3592 3700 cmd.exe reg.exe PID 804 wrote to memory of 2356 804 therapeutic-rule.exe svchost.exe PID 804 wrote to memory of 2500 804 therapeutic-rule.exe taskhostw.exe
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2500
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2356
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\therapeutic-rule.exe"C:\Users\Admin\AppData\Local\Temp\therapeutic-rule.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\therapeutic-rule.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\therapeutic-rule.exe" /f3⤵
- Adds Run key to start application
PID:3592