Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    22-10-2021 12:20

General

  • Target

    4708d7597f8efc46d22031ffc794047a.exe

  • Size

    6.0MB

  • MD5

    4708d7597f8efc46d22031ffc794047a

  • SHA1

    028dd45e2fb27d82f53c14f1dc9abfa3573b8c15

  • SHA256

    c45d421ef1cd52ccc0dfa8bbacd093af7fdca76d402c7d773e97a5b1f0c8522a

  • SHA512

    2e435473f8874a6544044ca3ad6f939e80d87bdbb4dd42427b2c111024dbd8132021044565416cac0d27b8e5f7460bf8f696bfb1c7b04fbff20ef33ff386e4ba

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Themida packer 23 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4708d7597f8efc46d22031ffc794047a.exe
    "C:\Users\Admin\AppData\Local\Temp\4708d7597f8efc46d22031ffc794047a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Users\Admin\AppData\Local\Temp\lizard\remedy.exe
      "C:\Users\Admin\AppData\Local\Temp\lizard\remedy.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Drops startup file
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        "C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        PID:852
    • C:\Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      "C:\Users\Admin\AppData\Local\Temp\lizard\simityvp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ljqriimqmfu.vbs"
        3⤵
          PID:1968
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ltfkqdfpj.vbs"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          PID:944

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      ab5c36d10261c173c5896f3478cdc6b7

      SHA1

      87ac53810ad125663519e944bc87ded3979cbee4

      SHA256

      f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

      SHA512

      e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      2001aaa3f2e5bf8f18b122d70905eb16

      SHA1

      3773cbcbc740ee458c25d4e7df4aa417b4641330

      SHA256

      e18a063f48a521ed5f3b11c607a13b059197ea0a4975d74c755b0e4ed07691fb

      SHA512

      4b23b1050bbc2a3c785eedfa72325e4b9d0597987623a58be5e7b0055ee4cf969f6ee28054b1caee1df21aa9fbe3af4fad236f48803b7fdc755098cebb6fb809

    • C:\Users\Admin\AppData\Local\Temp\lizard\remedy.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • C:\Users\Admin\AppData\Local\Temp\lizard\remedy.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • C:\Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      MD5

      7acd70f3dfdcd33dbe40603e939fcb79

      SHA1

      d7f63d7b0a37b3d78d13e8ea783e0aba6507aa20

      SHA256

      069539fb82534ac72239b2f35f4711cd4ac828d26ab29e159c1082f725b9999d

      SHA512

      4ef930ac69b82f078084212d6e57ea0522568452aca5e35de3a0b85a99a9dae6209fcd394582ea64ac8d45e9708dffefada5d267254332bfa62da780d968cefc

    • C:\Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      MD5

      7acd70f3dfdcd33dbe40603e939fcb79

      SHA1

      d7f63d7b0a37b3d78d13e8ea783e0aba6507aa20

      SHA256

      069539fb82534ac72239b2f35f4711cd4ac828d26ab29e159c1082f725b9999d

      SHA512

      4ef930ac69b82f078084212d6e57ea0522568452aca5e35de3a0b85a99a9dae6209fcd394582ea64ac8d45e9708dffefada5d267254332bfa62da780d968cefc

    • C:\Users\Admin\AppData\Local\Temp\ljqriimqmfu.vbs
      MD5

      b91ae9731e85b6a445097aff372c622a

      SHA1

      2f5e94ae42083db9f12910931305ee83313d37a3

      SHA256

      19c60531efa9f36004c842085e5542acbee78e8db31116421606a65da63b3f57

      SHA512

      1965d14082bed87b8ba07613d3f161d0d8c2fefb44069621ff9085909134f985db029449a0ae65a34cfdeb2715ea793c02d22e9e59908425cf30d5df6826f45e

    • C:\Users\Admin\AppData\Local\Temp\ltfkqdfpj.vbs
      MD5

      a15519191226c00b182dcbff584bebf0

      SHA1

      a84cc0e2fb1ff8c3b4f5be1fb5f630fb56e45b52

      SHA256

      89166d78f1c5433b3b099976bd10f1999c92620bb0644719557b5a7aa95c906d

      SHA512

      40ad1891ac93d7636f1e95d9017af8b745d9a02e706fc0fd7a8308c9074ab345e31076e1b40e27a419bc6ced5b14726b72134436e0f451b41a1be18de2b04b33

    • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • \Users\Admin\AppData\Local\Temp\lizard\remedy.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • \Users\Admin\AppData\Local\Temp\lizard\remedy.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • \Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      MD5

      7acd70f3dfdcd33dbe40603e939fcb79

      SHA1

      d7f63d7b0a37b3d78d13e8ea783e0aba6507aa20

      SHA256

      069539fb82534ac72239b2f35f4711cd4ac828d26ab29e159c1082f725b9999d

      SHA512

      4ef930ac69b82f078084212d6e57ea0522568452aca5e35de3a0b85a99a9dae6209fcd394582ea64ac8d45e9708dffefada5d267254332bfa62da780d968cefc

    • \Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      MD5

      7acd70f3dfdcd33dbe40603e939fcb79

      SHA1

      d7f63d7b0a37b3d78d13e8ea783e0aba6507aa20

      SHA256

      069539fb82534ac72239b2f35f4711cd4ac828d26ab29e159c1082f725b9999d

      SHA512

      4ef930ac69b82f078084212d6e57ea0522568452aca5e35de3a0b85a99a9dae6209fcd394582ea64ac8d45e9708dffefada5d267254332bfa62da780d968cefc

    • \Users\Admin\AppData\Local\Temp\lizard\simityvp.exe
      MD5

      7acd70f3dfdcd33dbe40603e939fcb79

      SHA1

      d7f63d7b0a37b3d78d13e8ea783e0aba6507aa20

      SHA256

      069539fb82534ac72239b2f35f4711cd4ac828d26ab29e159c1082f725b9999d

      SHA512

      4ef930ac69b82f078084212d6e57ea0522568452aca5e35de3a0b85a99a9dae6209fcd394582ea64ac8d45e9708dffefada5d267254332bfa62da780d968cefc

    • \Users\Admin\AppData\Local\Temp\nst34B8.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
      MD5

      a549bfe1170323076f438b7199bd39da

      SHA1

      fb893bcde83c6a8544276f464f03ec762cd3ca0a

      SHA256

      10a7145031d494fa4b85a71bf01ada3362ce77cd94dc8f6bd7c0afcf7797aac8

      SHA512

      469a623678fe783cac684b61431b8694f88cb23cf048df3e2d3e0f7955f92f79dcc58de03788d7a34c6ec7e9511c0902f72e8484ccf2834bb4275d362d81ceda

    • memory/576-73-0x000000013FCE0000-0x00000001405F8000-memory.dmp
      Filesize

      9.1MB

    • memory/576-71-0x000000013FCE0000-0x00000001405F8000-memory.dmp
      Filesize

      9.1MB

    • memory/576-75-0x000007FEFBA71000-0x000007FEFBA73000-memory.dmp
      Filesize

      8KB

    • memory/576-58-0x0000000000000000-mapping.dmp
    • memory/576-72-0x000000013FCE0000-0x00000001405F8000-memory.dmp
      Filesize

      9.1MB

    • memory/580-54-0x0000000074F81000-0x0000000074F83000-memory.dmp
      Filesize

      8KB

    • memory/852-79-0x0000000000000000-mapping.dmp
    • memory/852-81-0x000000013F690000-0x000000013FFA8000-memory.dmp
      Filesize

      9.1MB

    • memory/852-82-0x000000013F690000-0x000000013FFA8000-memory.dmp
      Filesize

      9.1MB

    • memory/852-83-0x000000013F690000-0x000000013FFA8000-memory.dmp
      Filesize

      9.1MB

    • memory/944-87-0x0000000000000000-mapping.dmp
    • memory/1124-69-0x0000000000CE0000-0x00000000013A9000-memory.dmp
      Filesize

      6.8MB

    • memory/1124-68-0x0000000000CE0000-0x00000000013A9000-memory.dmp
      Filesize

      6.8MB

    • memory/1124-67-0x0000000000CE0000-0x00000000013A9000-memory.dmp
      Filesize

      6.8MB

    • memory/1124-61-0x0000000000000000-mapping.dmp
    • memory/1124-70-0x0000000000CE0000-0x00000000013A9000-memory.dmp
      Filesize

      6.8MB

    • memory/1968-84-0x0000000000000000-mapping.dmp