Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    18-12-2021 14:32

General

  • Target

    e83517fe9b3f52c6e737fcc19419a8e5.exe

  • Size

    5.4MB

  • MD5

    e83517fe9b3f52c6e737fcc19419a8e5

  • SHA1

    04c6caae34bd9d7cac2377279e51371bd24e418e

  • SHA256

    75aa979f8875e3c4586d311d27612058c99e975649cd4ea26d0ee43d98888c8e

  • SHA512

    ca9f942efda428e73bc27927545b5cef8c001944ae801bff8c038bd77582c2a3007b6585bad313b05239f63783d81fda4faafd67bd82095fcb4ec395be6d5d41

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 10 IoCs
  • Themida packer 27 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e83517fe9b3f52c6e737fcc19419a8e5.exe
    "C:\Users\Admin\AppData\Local\Temp\e83517fe9b3f52c6e737fcc19419a8e5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      "C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
        "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:1900
    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      "C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cjrtntkabtsc.vbs"
        3⤵
          PID:1660
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wwkuxoidy.vbs"
          3⤵
          • Blocklisted process makes network request
          PID:1972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cjrtntkabtsc.vbs
      MD5

      2c868d945a4962657e975f1bb1cdd957

      SHA1

      dd0a78a6051239bd10e317cfddfef3a7fd8f86bd

      SHA256

      0fe2651b742c550eec6dbd437115755087a1e89418db4194876db4b6bc966676

      SHA512

      94b6ce97571ab50c03dfa1355ef4b895707570c7dc2f1cd5a4519d267aa4b7ec89f1f48c100a4a4c63e2beada4657451e75a90e97f08aa96c3b0be1e503e6694

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      a55279e83e6d459d64f3fd5d803617c9

      SHA1

      ddab1265597cf8b90c4da9c81f591b82f8bfe982

      SHA256

      d51968d83219b0cdcb31e48939904cac7747f19d083bf76681635c09fea74b0b

      SHA512

      ed4137fcd31c1749d0f30c22ef2e96f876914e5bb629696c291a2c78d7b3daa9b994d4d4106b1a423e41ca0b71ab14e2419377541ce0516ac2a98c5226ba14a5

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      a55279e83e6d459d64f3fd5d803617c9

      SHA1

      ddab1265597cf8b90c4da9c81f591b82f8bfe982

      SHA256

      d51968d83219b0cdcb31e48939904cac7747f19d083bf76681635c09fea74b0b

      SHA512

      ed4137fcd31c1749d0f30c22ef2e96f876914e5bb629696c291a2c78d7b3daa9b994d4d4106b1a423e41ca0b71ab14e2419377541ce0516ac2a98c5226ba14a5

    • C:\Users\Admin\AppData\Local\Temp\wwkuxoidy.vbs
      MD5

      17cd4296d4a62ce7ea8ec465c758d8ae

      SHA1

      93e4e7949613321bb3856b4ea917650c53575e6c

      SHA256

      1d1e4a622ad3d7b33001bec9007870a54ce4312fb2cc8e039ff49e8b367d69a1

      SHA512

      4af4d25bd891364908ee34134133bf7142adb5c051435011a80577e4934d892e8401a3766ae48a7bec66cc2dacbb621a1b31a643e31344e3cff740468b5da683

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      a55279e83e6d459d64f3fd5d803617c9

      SHA1

      ddab1265597cf8b90c4da9c81f591b82f8bfe982

      SHA256

      d51968d83219b0cdcb31e48939904cac7747f19d083bf76681635c09fea74b0b

      SHA512

      ed4137fcd31c1749d0f30c22ef2e96f876914e5bb629696c291a2c78d7b3daa9b994d4d4106b1a423e41ca0b71ab14e2419377541ce0516ac2a98c5226ba14a5

    • \Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      a55279e83e6d459d64f3fd5d803617c9

      SHA1

      ddab1265597cf8b90c4da9c81f591b82f8bfe982

      SHA256

      d51968d83219b0cdcb31e48939904cac7747f19d083bf76681635c09fea74b0b

      SHA512

      ed4137fcd31c1749d0f30c22ef2e96f876914e5bb629696c291a2c78d7b3daa9b994d4d4106b1a423e41ca0b71ab14e2419377541ce0516ac2a98c5226ba14a5

    • \Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      a55279e83e6d459d64f3fd5d803617c9

      SHA1

      ddab1265597cf8b90c4da9c81f591b82f8bfe982

      SHA256

      d51968d83219b0cdcb31e48939904cac7747f19d083bf76681635c09fea74b0b

      SHA512

      ed4137fcd31c1749d0f30c22ef2e96f876914e5bb629696c291a2c78d7b3daa9b994d4d4106b1a423e41ca0b71ab14e2419377541ce0516ac2a98c5226ba14a5

    • \Users\Admin\AppData\Local\Temp\nsiDEDB.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      792cef7a7b7a68ccd4348e7b17aae3a7

      SHA1

      9b90b4f292488b4b8df943f4937d4158f2c3d392

      SHA256

      4d0ebd85da282bb75b2439f9baa30c3ff3788e556c32713e48f786defe408eac

      SHA512

      b023222cbece71f806651fdb15ec8140931a605ea2e7c75a3e254fab2b9007274ff5cabd0b03175c9d70dc4c6a078a1989c4a7618d9bf2805ba3cc009e53c620

    • memory/652-78-0x0000000000C10000-0x0000000001300000-memory.dmp
      Filesize

      6.9MB

    • memory/652-72-0x0000000000C10000-0x0000000001300000-memory.dmp
      Filesize

      6.9MB

    • memory/652-74-0x0000000000C10000-0x0000000001300000-memory.dmp
      Filesize

      6.9MB

    • memory/652-76-0x0000000000C10000-0x0000000001300000-memory.dmp
      Filesize

      6.9MB

    • memory/652-58-0x0000000000000000-mapping.dmp
    • memory/1200-77-0x0000000001340000-0x0000000001A0A000-memory.dmp
      Filesize

      6.8MB

    • memory/1200-73-0x0000000001340000-0x0000000001A0A000-memory.dmp
      Filesize

      6.8MB

    • memory/1200-65-0x0000000000000000-mapping.dmp
    • memory/1200-75-0x0000000001340000-0x0000000001A0A000-memory.dmp
      Filesize

      6.8MB

    • memory/1200-71-0x0000000001340000-0x0000000001A0A000-memory.dmp
      Filesize

      6.8MB

    • memory/1660-79-0x0000000000000000-mapping.dmp
    • memory/1732-55-0x0000000076371000-0x0000000076373000-memory.dmp
      Filesize

      8KB

    • memory/1900-83-0x0000000000000000-mapping.dmp
    • memory/1900-89-0x00000000002E0000-0x00000000009D0000-memory.dmp
      Filesize

      6.9MB

    • memory/1900-90-0x00000000002E0000-0x00000000009D0000-memory.dmp
      Filesize

      6.9MB

    • memory/1900-91-0x00000000002E0000-0x00000000009D0000-memory.dmp
      Filesize

      6.9MB

    • memory/1900-92-0x00000000002E0000-0x00000000009D0000-memory.dmp
      Filesize

      6.9MB

    • memory/1972-93-0x0000000000000000-mapping.dmp