Analysis

  • max time kernel
    50s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    07-02-2022 03:39

General

  • Target

    166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe

  • Size

    172KB

  • MD5

    8e96a36f11abb8a0d634637bbc67d35e

  • SHA1

    1320a8008d59092b7cf29fbc9656bb985a04e5d7

  • SHA256

    166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6

  • SHA512

    11c26816157939120900d619069a87c8c6a947d5b17f3a3326a71244e1f405eb761f4d99637dc39d6f664a9f5948c02353b5f527fb3fad10d4f0477ac6dabdf5

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 46 IoCs
  • Registers COM server for autorun 1 TTPs
  • Modifies Installed Components in the registry 2 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe
    "C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5155.tmp\51B3.bat C:\Users\Admin\AppData\Local\Temp\166c3c2fbe8392fb4b4ddaf5f192d94cc321c5fc4d65bd698a4d691416e999c6.exe"
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\system32\cacls.exe
        "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
        3⤵
          PID:3172
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Lenovo (-26385)" /d "C:\Users\Public\LENOVO.DAT.vbs" /f
          3⤵
          • Adds Run key to start application
          PID:2704
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Lenovo (-23392)" /d "C:\Windows\System32\icmp.vbs" /f
          3⤵
          • Adds Run key to start application
          PID:2496
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 2 /NOBREAK
          3⤵
          • Delays execution with timeout.exe
          PID:3492
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\System32\icmp.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\icmp.bat" "
            4⤵
            • Drops file in Program Files directory
            PID:3048
        • C:\Windows\system32\reg.exe
          REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot" /v AlternateShell /f
          3⤵
            PID:3768
          • C:\Windows\system32\reg.exe
            REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot" /f
            3⤵
              PID:4000
            • C:\Windows\system32\reg.exe
              REG DELETE "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\*.*" /f
              3⤵
                PID:1596
              • C:\Windows\system32\reg.exe
                REG DELETE "HKEY_LOCAL_MACHINE" /f
                3⤵
                • Modifies system executable filetype association
                • Checks processor information in registry
                • Enumerates system info in registry
                • Modifies Internet Explorer settings
                • Modifies registry class
                PID:2504
              • C:\Windows\system32\reg.exe
                REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v
                3⤵
                  PID:2668
                • C:\Windows\system32\reg.exe
                  REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v
                  3⤵
                    PID:1756
                  • C:\Windows\system32\reg.exe
                    REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
                    3⤵
                      PID:388
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
                      3⤵
                        PID:3260
                  • C:\Windows\system32\MusNotifyIcon.exe
                    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
                    1⤵
                    • Checks processor information in registry
                    PID:3868
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k NetworkService -p
                    1⤵
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:2140
                  • C:\Windows\system32\MusNotifyIcon.exe
                    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
                    1⤵
                    • Checks processor information in registry
                    PID:1252

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Change Default File Association

                  1
                  T1042

                  Registry Run Keys / Startup Folder

                  3
                  T1060

                  Defense Evasion

                  Modify Registry

                  4
                  T1112

                  Discovery

                  Query Registry

                  3
                  T1012

                  System Information Discovery

                  4
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5155.tmp\51B3.bat
                    MD5

                    5b6d9ddcbf97f42572f743d501467d32

                    SHA1

                    167521aef433a1e72865e49a3512ee4901b6da11

                    SHA256

                    77c4f1f7ca509556f0295d5ea58461c71a807d8af072a1dabc6eb07c099054ab

                    SHA512

                    df4b8dbfcb62c269572f07ac985c51ef41c12ee068726b59dbcc35e1303813c8ddc1cf4701b609919fc7044e97057c2414730fb6c567ba0b2b8f170aeddaf5d3

                  • C:\Windows\System32\icmp.bat
                    MD5

                    c4cd4269477d1344a76832b7dcf5b3a6

                    SHA1

                    239fb9a55cce0e4d17f044824c1ba4e9f6c6ef88

                    SHA256

                    66aaf39d544fa2fe0eb67ecf8ee332592b19ecdcfef25e702a56ccfc6d9a7199

                    SHA512

                    df1db9d6c2e982e126a95bdf6966be60ba3847df9be72c0e243e6d844c722deec016fb38b003e772c9823432d01a1b28306743086812700bc45ca43dd50f3c7d

                  • C:\Windows\System32\icmp.vbs
                    MD5

                    8eec64d869468def4c8487e906e2c158

                    SHA1

                    551f8abc3d0e4e2c660bc828b75cc84e2c46382d

                    SHA256

                    b102ffcb8b05006374df3585807975e2c19a4ce0a07b8ae9435c151385459b6b

                    SHA512

                    4486f7d60868cf2073f13c0afab790b6a3a929ac189baeff237487247b1bd292e3b73ae2f201039f97e365275bff8fb1b029371104567b3d455dc6405a3e7e86