Analysis

  • max time kernel
    317s
  • max time network
    302s
  • platform
    windows7_x64
  • resource
    win7-ja-20211014
  • submitted
    21-10-2021 12:38

General

  • Target

    Tornado.exe

  • Size

    331.0MB

  • MD5

    2acf755a8825894b837989ce1ae3db1d

  • SHA1

    17d5590e64a1df1470e83f79eb935d78bc218c2d

  • SHA256

    876dbe0fdf3f4ec70bd1985bf7c6f661b1105efd591407a6dd7ca7506bc61adf

  • SHA512

    f5ca9da28f33097e92714f1e329d62fa8b98afe35bdaaf9e4941ad8f46c9350df74117b4712abc83c7bf44d6a1cb357b44bfb426d7ab0eeb88b3c813e99eef4b

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tornado.exe
    "C:\Users\Admin\AppData\Local\Temp\Tornado.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QAAoAGUAYwBoAG8AIABvAGYAZgAlACkAWwAxAF0ADQAKAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAiAEMAOgBcACIA
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\tmp3765.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3765.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        3⤵
          PID:972
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Starne.mid
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^kXhUbWhdyiSzQwKWBBZJjppRDRvuTjJfOgrsoBnWshULiZzcvfBNflRwOcsFmuvSnDFCYzOqeeaZfbKDnwKEL$" Sorte.mid
              5⤵
                PID:528
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
                Nascondere.exe.com W
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1476
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com W
                  6⤵
                  • Executes dropped EXE
                  • Drops startup file
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1688
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1496
              • C:\Windows\SysWOW64\PING.EXE
                ping localhost
                5⤵
                • Runs ping.exe
                PID:852
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {BEBC290F-3BB1-44EE-B86C-B7FCADA17766} S-1-5-18:NT AUTHORITY\System:Service:
        1⤵
          PID:540

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ambo.mid
          MD5

          e44fd575c6528190adc21c41297c7f0f

          SHA1

          4a834789bb3ddeea37cd30861a4c0bb639eeafed

          SHA256

          9ae0b37e4b26a6684eed731f3c3958e3661a3da9a89759825b97efebfe183547

          SHA512

          443f8aff20c51f236b16eba5dbe3890d157f85909ab36b1d084142836a343e6acb97e752d18819bec62e1458a038d9b24c609602dc3cbef87d959e597e0af19f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ami.mid
          MD5

          c2a501f010bf7b1c7a9777c3b93e19ef

          SHA1

          d00adfeb88b435786f32cf7f45c1aae141690600

          SHA256

          312d9b0380e5d8fd0bbee92b5d7f22a09b9278cbd7457777a08e2df5a859aff9

          SHA512

          2850ad61312adc4d059e62c7dfaebabaa74ac280773e24920b746a56884d8c490b1d5c6637d56c966ca284a9cd515330d38faff55cfe77a1bd11f54f2c82f6fd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorte.mid
          MD5

          ca6c6b8893411108280a0daf1a4d7d61

          SHA1

          b791c3cdec5711baafa7be643d2d9a0a10ae0835

          SHA256

          61b5e21e9798a8bf59a1c2e284d78d86706b4dc9bd6bef46bce54af95886bb46

          SHA512

          c0f8c6e6c08a96d6bc9b77af1f300d45b011faa606c85b6220b89d890692d200230c16a206fa6c94a5f9e1568eb10181199a0d6b80b94f80706a5cd00f4fdbcf

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Starne.mid
          MD5

          603011f56db8309b2d5c4ea0a1c57a47

          SHA1

          91ffdd8dbc6c5935c954f2764bec480ae32a1432

          SHA256

          5e4c34d70260f9bc2ce9f44b8fdef503667493f8d7c9d13b659da3b270a053f0

          SHA512

          b1d53112fb89fc755e3933e88bcabd1ce2a2aa0032c948530769d96d06ca066d106fcdf2127348e618c7aac8b24b21ddbbdbdfd5113a641dbcd2da217d9ebdbe

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W
          MD5

          e44fd575c6528190adc21c41297c7f0f

          SHA1

          4a834789bb3ddeea37cd30861a4c0bb639eeafed

          SHA256

          9ae0b37e4b26a6684eed731f3c3958e3661a3da9a89759825b97efebfe183547

          SHA512

          443f8aff20c51f236b16eba5dbe3890d157f85909ab36b1d084142836a343e6acb97e752d18819bec62e1458a038d9b24c609602dc3cbef87d959e597e0af19f

        • C:\Users\Admin\AppData\Local\Temp\tmp3765.tmp.exe
          MD5

          44150395748c027ef5f8eed812f620b0

          SHA1

          0d26c44e5e93a08da7504344498d3275ca11653e

          SHA256

          144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

          SHA512

          5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • \Users\Admin\AppData\Local\Temp\tmp3765.tmp.exe
          MD5

          44150395748c027ef5f8eed812f620b0

          SHA1

          0d26c44e5e93a08da7504344498d3275ca11653e

          SHA256

          144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

          SHA512

          5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

        • \Users\Admin\AppData\Local\Temp\tmp3765.tmp.exe
          MD5

          44150395748c027ef5f8eed812f620b0

          SHA1

          0d26c44e5e93a08da7504344498d3275ca11653e

          SHA256

          144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

          SHA512

          5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

        • memory/528-73-0x0000000000000000-mapping.dmp
        • memory/608-63-0x00000000023F0000-0x000000000303A000-memory.dmp
          Filesize

          12.3MB

        • memory/608-60-0x0000000000000000-mapping.dmp
        • memory/608-62-0x00000000023F0000-0x000000000303A000-memory.dmp
          Filesize

          12.3MB

        • memory/608-64-0x00000000023F0000-0x000000000303A000-memory.dmp
          Filesize

          12.3MB

        • memory/852-79-0x0000000000000000-mapping.dmp
        • memory/972-69-0x0000000000000000-mapping.dmp
        • memory/1476-77-0x0000000000000000-mapping.dmp
        • memory/1496-99-0x0000000005B90000-0x0000000005B91000-memory.dmp
          Filesize

          4KB

        • memory/1496-97-0x0000000000090000-0x0000000000142000-memory.dmp
          Filesize

          712KB

        • memory/1496-91-0x0000000000090000-0x0000000000142000-memory.dmp
          Filesize

          712KB

        • memory/1496-89-0x0000000000090000-0x0000000000142000-memory.dmp
          Filesize

          712KB

        • memory/1688-90-0x00000000001B0000-0x00000000001B1000-memory.dmp
          Filesize

          4KB

        • memory/1688-84-0x0000000000000000-mapping.dmp
        • memory/1772-59-0x0000000004F05000-0x0000000004F16000-memory.dmp
          Filesize

          68KB

        • memory/1772-57-0x0000000074931000-0x0000000074933000-memory.dmp
          Filesize

          8KB

        • memory/1772-55-0x00000000002C0000-0x00000000002C1000-memory.dmp
          Filesize

          4KB

        • memory/1772-58-0x0000000004F00000-0x0000000004F01000-memory.dmp
          Filesize

          4KB

        • memory/1884-67-0x0000000000000000-mapping.dmp
        • memory/1976-72-0x0000000000000000-mapping.dmp
        • memory/1980-70-0x0000000000000000-mapping.dmp