Analysis

  • max time kernel
    65s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    07-02-2022 03:39

General

  • Target

    166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe

  • Size

    172KB

  • MD5

    8e96a36f11abb8a0d634637bbc67d35e

  • SHA1

    1320a8008d59092b7cf29fbc9656bb985a04e5d7

  • SHA256

    166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6

  • SHA512

    11c26816157939120900d619069a87c8c6a947d5b17f3a3326a71244e1f405eb761f4d99637dc39d6f664a9f5948c02353b5f527fb3fad10d4f0477ac6dabdf5

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
  • Modifies firewall policy service 2 TTPs 36 IoCs
  • Modifies security service 2 TTPs 18 IoCs
  • Modifies system executable filetype association 2 TTPs 45 IoCs
  • Registers COM server for autorun 1 TTPs
  • Modifies Installed Components in the registry 2 TTPs
  • Registers new Print Monitor 2 TTPs
  • Sets file execution options in registry 2 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe
    "C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D383.tmp\D394.bat C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\system32\cacls.exe
        "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
        3⤵
          PID:1552
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Lenovo (-5934)" /d "C:\Users\Public\LENOVO.DAT.vbs" /f
          3⤵
          • Adds Run key to start application
          PID:1616
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Lenovo (-11551)" /d "C:\Windows\System32\icmp.vbs" /f
          3⤵
          • Adds Run key to start application
          PID:1412
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 2 /NOBREAK
          3⤵
          • Delays execution with timeout.exe
          PID:612
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\System32\icmp.vbs"
          3⤵
            PID:1580
          • C:\Windows\system32\reg.exe
            REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot" /v AlternateShell /f
            3⤵
              PID:1344
            • C:\Windows\system32\reg.exe
              REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot" /f
              3⤵
                PID:832
              • C:\Windows\system32\reg.exe
                REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\*.*" /f
                3⤵
                  PID:1540
                • C:\Windows\system32\reg.exe
                  REG DELETE "HKEY_LOCAL_MACHINE" /f
                  3⤵
                  • Modifies firewall policy service
                  • Modifies security service
                  • Modifies system executable filetype association
                  • Adds Run key to start application
                  • Maps connected drives based on registry
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  PID:960
                • C:\Windows\system32\reg.exe
                  REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v
                  3⤵
                    PID:592
                  • C:\Windows\system32\reg.exe
                    REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v
                    3⤵
                      PID:560
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
                      3⤵
                        PID:1120
                      • C:\Windows\system32\reg.exe
                        REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
                        3⤵
                          PID:1492

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Persistence

                    Registry Run Keys / Startup Folder

                    6
                    T1060

                    Modify Existing Service

                    2
                    T1031

                    Change Default File Association

                    1
                    T1042

                    Browser Extensions

                    1
                    T1176

                    Defense Evasion

                    Modify Registry

                    10
                    T1112

                    Credential Access

                    Credentials in Files

                    1
                    T1081

                    Discovery

                    Query Registry

                    3
                    T1012

                    Peripheral Device Discovery

                    1
                    T1120

                    System Information Discovery

                    4
                    T1082

                    Collection

                    Data from Local System

                    1
                    T1005

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\D383.tmp\D394.bat
                      MD5

                      5b6d9ddcbf97f42572f743d501467d32

                      SHA1

                      167521aef433a1e72865e49a3512ee4901b6da11

                      SHA256

                      77c4f1f7ca509556f0295d5ea58461c71a807d8af072a1dabc6eb07c099054ab

                      SHA512

                      df4b8dbfcb62c269572f07ac985c51ef41c12ee068726b59dbcc35e1303813c8ddc1cf4701b609919fc7044e97057c2414730fb6c567ba0b2b8f170aeddaf5d3

                    • C:\Windows\System32\icmp.vbs
                      MD5

                      8eec64d869468def4c8487e906e2c158

                      SHA1

                      551f8abc3d0e4e2c660bc828b75cc84e2c46382d

                      SHA256

                      b102ffcb8b05006374df3585807975e2c19a4ce0a07b8ae9435c151385459b6b

                      SHA512

                      4486f7d60868cf2073f13c0afab790b6a3a929ac189baeff237487247b1bd292e3b73ae2f201039f97e365275bff8fb1b029371104567b3d455dc6405a3e7e86

                    • memory/1256-55-0x00000000763F1000-0x00000000763F3000-memory.dmp
                      Filesize

                      8KB

                    • memory/1996-57-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
                      Filesize

                      8KB