Resubmissions

23-09-2021 13:59

210923-ractvaefc5 8

22-08-2021 12:44

210822-vqqzsf2ch6 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    23-09-2021 13:59

General

  • Target

    ApowerREC.exe

  • Size

    8.9MB

  • MD5

    810be064429970190268a24af354a2f1

  • SHA1

    f5e17599a9c30a9eada1dcb276b888bdeffd037d

  • SHA256

    7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b

  • SHA512

    d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe
    "C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c
      2⤵
        PID:2516
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          -d 56007 TCP
          3⤵
            PID:660
          • C:\Users\Admin\AppData\Local\Temp\revpe.exe
            -d 56007 TCP
            3⤵
            • Executes dropped EXE
            PID:664
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            -a 10.127.1.41 56007 56007 TCP
            3⤵
              PID:1272
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              -d 56008 TCP
              3⤵
                PID:2400
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                -a 10.127.1.41 56008 56008 TCP
                3⤵
                  PID:432
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe'" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe'" /f
                  3⤵
                  • Creates scheduled task(s)
                  PID:532
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe" "C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe"
                2⤵
                  PID:2712
              • C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                C:\Users\Admin\AppData\Local\Temp\chrome\chrome.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1316
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c
                  2⤵
                    PID:1544
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2240
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1892
                    2⤵
                    • Program crash
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2956

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/664-132-0x0000000000400000-0x000000000041B000-memory.dmp

                  Filesize

                  108KB

                • memory/664-148-0x0000000000400000-0x000000000041B000-memory.dmp

                  Filesize

                  108KB

                • memory/1316-154-0x0000000000D90000-0x0000000000D91000-memory.dmp

                  Filesize

                  4KB

                • memory/1316-160-0x00000000033A0000-0x00000000033A1000-memory.dmp

                  Filesize

                  4KB

                • memory/1784-119-0x00000000054E0000-0x00000000054E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1784-120-0x00000000054A0000-0x00000000054A1000-memory.dmp

                  Filesize

                  4KB

                • memory/1784-115-0x0000000000C10000-0x0000000000C11000-memory.dmp

                  Filesize

                  4KB

                • memory/1784-118-0x00000000053C0000-0x00000000053C1000-memory.dmp

                  Filesize

                  4KB

                • memory/1784-117-0x00000000059F0000-0x00000000059F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2788-131-0x00000000071D0000-0x00000000081D0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2788-126-0x0000000000400000-0x00000000005F7000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2788-122-0x0000000000400000-0x00000000005F7000-memory.dmp

                  Filesize

                  2.0MB