Resubmissions

07-09-2021 18:08

210907-wq7rdadba9 10

07-09-2021 17:57

210907-wjxylagcfn 10

Analysis

  • max time kernel
    874s
  • max time network
    1588s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    07-09-2021 18:08

General

  • Target

    keygen-step-6.exe

  • Size

    267KB

  • MD5

    093bc5ebd2d2a39d84c1d35fbd2d9efa

  • SHA1

    e028ca17fe2c7cbf7ad234b28cd50ad2c7c440e5

  • SHA256

    ee2994ea7f202516db816f85f23aac0a13ec32743d0555f81d68568bb40f4811

  • SHA512

    da58e87b099d520f02715ffcf6b50e2a586b6baec5b64d5ee39fb4c4a81ee9b8c18c8e341ee8befcf9048088661d7f182a937a7948aacfac926f1710fa77bcfa

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 43 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exe" >> NUL
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1440
  • C:\Windows\System32\sihclient.exe
    C:\Windows\System32\sihclient.exe /cv bIwyp2o330q1fggh9KFnew.0.2
    1⤵
    • Modifies data under HKEY_USERS
    PID:5056
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:4192
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
    1⤵
      PID:3064

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/572-159-0x0000000000000000-mapping.dmp
    • memory/1440-160-0x0000000000000000-mapping.dmp
    • memory/2412-146-0x0000000000DE0000-0x0000000000DF8000-memory.dmp
      Filesize

      96KB

    • memory/4192-150-0x0000026BE7270000-0x0000026BE7280000-memory.dmp
      Filesize

      64KB

    • memory/4192-151-0x0000026BE72F0000-0x0000026BE7300000-memory.dmp
      Filesize

      64KB

    • memory/4192-152-0x0000026BE98F0000-0x0000026BE98F4000-memory.dmp
      Filesize

      16KB

    • memory/4192-153-0x0000026BE9BE0000-0x0000026BE9BE4000-memory.dmp
      Filesize

      16KB

    • memory/4192-154-0x0000026BE9BA0000-0x0000026BE9BA1000-memory.dmp
      Filesize

      4KB

    • memory/4192-155-0x0000026BE9920000-0x0000026BE9924000-memory.dmp
      Filesize

      16KB

    • memory/4192-156-0x0000026BE9910000-0x0000026BE9911000-memory.dmp
      Filesize

      4KB

    • memory/4192-157-0x0000026BE9910000-0x0000026BE9914000-memory.dmp
      Filesize

      16KB

    • memory/4192-158-0x0000026BE75F0000-0x0000026BE75F1000-memory.dmp
      Filesize

      4KB