Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    21-10-2021 16:04

General

  • Target

    748984d40e7ab68b0a130a620b550a3d.exe

  • Size

    5.9MB

  • MD5

    748984d40e7ab68b0a130a620b550a3d

  • SHA1

    ac800bb6aaf3172d3d0170300f8ba3dc03304b60

  • SHA256

    4f27a3fe51d0494d18648a7279b2a368f86288148b7c1044d4d24ae7e4dfcca1

  • SHA512

    af6fc23b6ec54e36a150f824060b3b14fbc39c0dd88023bda5891a99d79e6aa81a8300fc053b3f8c004d25399b61e5012898a636b6d3e5e8f695d49df8f93f5c

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Themida packer 23 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\748984d40e7ab68b0a130a620b550a3d.exe
    "C:\Users\Admin\AppData\Local\Temp\748984d40e7ab68b0a130a620b550a3d.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe
      "C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Drops startup file
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        "C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        PID:1668
    • C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      "C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ljbftlmq.vbs"
        3⤵
          PID:1996
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qrfineiwlywg.vbs"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          PID:1804

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      ab5c36d10261c173c5896f3478cdc6b7

      SHA1

      87ac53810ad125663519e944bc87ded3979cbee4

      SHA256

      f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

      SHA512

      e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      671d0053972ae504a8ad7b8f559bdd46

      SHA1

      c7ec1cbe82ead990a4ba1349f52d5a777a2dac6b

      SHA256

      978b1fb21353d2b215a5c03f103794f2309ffc09e4f381974a217c4980ce19fc

      SHA512

      bd1a85057b471938fcf62eb5e79c49153105fd155b361df82bd75c39e98e44365058091e2c105380729ab3e6d3865c5b152a5f9f3c14c2760ff91c9d26976b75

    • C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • C:\Users\Admin\AppData\Local\Temp\lizard\undirk.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      MD5

      5f1ed0072d716d250b0eaf6982cdc03b

      SHA1

      62b3ede1369d53017bad62ddda5072817be5ae42

      SHA256

      b182a54926df679c8c8598095a8acb09a8c9d7165e3dd700d92c65a751151a02

      SHA512

      e6a3977c9674f12eb5752d6ff1caa1ee028a3b448bf2d91eb18309a5640e27b542e10acad33808d7065bb2c1a357a3d64e4a077b4321885e994bccf662a5671e

    • C:\Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      MD5

      5f1ed0072d716d250b0eaf6982cdc03b

      SHA1

      62b3ede1369d53017bad62ddda5072817be5ae42

      SHA256

      b182a54926df679c8c8598095a8acb09a8c9d7165e3dd700d92c65a751151a02

      SHA512

      e6a3977c9674f12eb5752d6ff1caa1ee028a3b448bf2d91eb18309a5640e27b542e10acad33808d7065bb2c1a357a3d64e4a077b4321885e994bccf662a5671e

    • C:\Users\Admin\AppData\Local\Temp\ljbftlmq.vbs
      MD5

      218af87e1ba07d88f8cf66fc4a6443de

      SHA1

      96f734f4bfa1564fa4316358287014feb652bf26

      SHA256

      e61a6f719307a1e25fd962446a7d18056001e1b43d2ae4ff3e7f270ba31eab20

      SHA512

      99855397963fa2fdf1eb13dbcc96bab9235fb0a3e8e1b3aa1d1a266052900fdcef73f55f208206c561dda449ec49c19a1b185b868c1fec31f09b85471e710cb1

    • C:\Users\Admin\AppData\Local\Temp\qrfineiwlywg.vbs
      MD5

      6802328851ee66f991335c946f761425

      SHA1

      26f7371f2cf20ef578d9982e33856c37783804c4

      SHA256

      f5fad0e4984e8e8acc2297db51b410c683e5fe247bc770cc975e43b5cb55cc96

      SHA512

      ff98b23f7345cb2e9dc55d7a05d5a96084aa7dcfc67f4821905172b48f8e7ce566c757b142d38085468443826848b646db45aaaecae82609156803097793bad7

    • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • \Users\Admin\AppData\Local\Temp\lizard\undirk.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • \Users\Admin\AppData\Local\Temp\lizard\undirk.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • \Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      MD5

      5f1ed0072d716d250b0eaf6982cdc03b

      SHA1

      62b3ede1369d53017bad62ddda5072817be5ae42

      SHA256

      b182a54926df679c8c8598095a8acb09a8c9d7165e3dd700d92c65a751151a02

      SHA512

      e6a3977c9674f12eb5752d6ff1caa1ee028a3b448bf2d91eb18309a5640e27b542e10acad33808d7065bb2c1a357a3d64e4a077b4321885e994bccf662a5671e

    • \Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      MD5

      5f1ed0072d716d250b0eaf6982cdc03b

      SHA1

      62b3ede1369d53017bad62ddda5072817be5ae42

      SHA256

      b182a54926df679c8c8598095a8acb09a8c9d7165e3dd700d92c65a751151a02

      SHA512

      e6a3977c9674f12eb5752d6ff1caa1ee028a3b448bf2d91eb18309a5640e27b542e10acad33808d7065bb2c1a357a3d64e4a077b4321885e994bccf662a5671e

    • \Users\Admin\AppData\Local\Temp\lizard\yoicksvp.exe
      MD5

      5f1ed0072d716d250b0eaf6982cdc03b

      SHA1

      62b3ede1369d53017bad62ddda5072817be5ae42

      SHA256

      b182a54926df679c8c8598095a8acb09a8c9d7165e3dd700d92c65a751151a02

      SHA512

      e6a3977c9674f12eb5752d6ff1caa1ee028a3b448bf2d91eb18309a5640e27b542e10acad33808d7065bb2c1a357a3d64e4a077b4321885e994bccf662a5671e

    • \Users\Admin\AppData\Local\Temp\nsiE58F.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      dee7f81724e172738ba8942a2c56c9d0

      SHA1

      debcc55ada38e5252a985dd205749bec5cc423cb

      SHA256

      783c54026f897bbb1f1efcb9da71102ad0a278d3b2ee5bbd6d8a8a8961489890

      SHA512

      e7bd7da4798e659db85f35cb17246c56f1a801323958f3af59c70efb9deb38b70ce0bf4e6f754e906c3ae736ffc670c8f724e6eb1c9f2e7f972cce541ce4d453

    • memory/332-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
      Filesize

      8KB

    • memory/1396-69-0x000000013FF30000-0x000000014084A000-memory.dmp
      Filesize

      9.1MB

    • memory/1396-71-0x000007FEFBF91000-0x000007FEFBF93000-memory.dmp
      Filesize

      8KB

    • memory/1396-58-0x0000000000000000-mapping.dmp
    • memory/1396-64-0x000000013FF30000-0x000000014084A000-memory.dmp
      Filesize

      9.1MB

    • memory/1396-68-0x000000013FF30000-0x000000014084A000-memory.dmp
      Filesize

      9.1MB

    • memory/1668-83-0x000000013FC70000-0x000000014058A000-memory.dmp
      Filesize

      9.1MB

    • memory/1668-79-0x0000000000000000-mapping.dmp
    • memory/1668-81-0x000000013FC70000-0x000000014058A000-memory.dmp
      Filesize

      9.1MB

    • memory/1668-82-0x000000013FC70000-0x000000014058A000-memory.dmp
      Filesize

      9.1MB

    • memory/1728-74-0x0000000000270000-0x00000000008DC000-memory.dmp
      Filesize

      6.4MB

    • memory/1728-72-0x0000000000270000-0x00000000008DC000-memory.dmp
      Filesize

      6.4MB

    • memory/1728-73-0x0000000000270000-0x00000000008DC000-memory.dmp
      Filesize

      6.4MB

    • memory/1728-61-0x0000000000000000-mapping.dmp
    • memory/1728-75-0x0000000000270000-0x00000000008DC000-memory.dmp
      Filesize

      6.4MB

    • memory/1804-87-0x0000000000000000-mapping.dmp
    • memory/1996-84-0x0000000000000000-mapping.dmp