Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    10-02-2022 21:59

General

  • Target

    system.exe

  • Size

    171KB

  • MD5

    223b16194882202508eb561542596b24

  • SHA1

    b166b6c9b8e92563314d3d7e360b887bab48e8b4

  • SHA256

    918bdb78e8219893c11138fb33e7542c76991a23cc34098d7f7d608810e6d3b7

  • SHA512

    82845a126588238f02ea8767c484d0abf47080bae35fe7373eecb94e84b8b171fc47358684879735d81e2d7b45eafad39d27385e6ae32986ec55b16d9c42e2c9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 16 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\system.exe
    "C:\Users\Admin\AppData\Local\Temp\system.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zS461A.tmp\system.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
        3⤵
          PID:3552
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe New-NetFirewallRule -Name allowRemoteDesktop -DisplayName 'allow RemoteDesktop' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 3369
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2900
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3476
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:4048

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2900-133-0x00000000733BE000-0x00000000733BF000-memory.dmp

      Filesize

      4KB

    • memory/2900-134-0x0000000004F50000-0x0000000004F86000-memory.dmp

      Filesize

      216KB

    • memory/2900-135-0x0000000007A50000-0x0000000008078000-memory.dmp

      Filesize

      6.2MB

    • memory/2900-136-0x0000000005090000-0x0000000005091000-memory.dmp

      Filesize

      4KB

    • memory/2900-137-0x0000000005092000-0x0000000005093000-memory.dmp

      Filesize

      4KB

    • memory/2900-138-0x0000000007890000-0x00000000078B2000-memory.dmp

      Filesize

      136KB

    • memory/2900-139-0x00000000081A0000-0x0000000008206000-memory.dmp

      Filesize

      408KB

    • memory/2900-140-0x0000000008210000-0x0000000008276000-memory.dmp

      Filesize

      408KB

    • memory/2900-141-0x0000000008760000-0x000000000877E000-memory.dmp

      Filesize

      120KB

    • memory/2900-142-0x0000000005095000-0x0000000005097000-memory.dmp

      Filesize

      8KB

    • memory/2900-143-0x0000000008E20000-0x0000000008E52000-memory.dmp

      Filesize

      200KB

    • memory/2900-144-0x000000006FC40000-0x000000006FC8C000-memory.dmp

      Filesize

      304KB

    • memory/2900-145-0x0000000008DF0000-0x0000000008E0E000-memory.dmp

      Filesize

      120KB

    • memory/2900-146-0x000000000A1A0000-0x000000000A81A000-memory.dmp

      Filesize

      6.5MB

    • memory/2900-147-0x0000000009B60000-0x0000000009B7A000-memory.dmp

      Filesize

      104KB

    • memory/2900-148-0x000000007F1B0000-0x000000007F1B1000-memory.dmp

      Filesize

      4KB

    • memory/2900-149-0x0000000009BD0000-0x0000000009BDA000-memory.dmp

      Filesize

      40KB

    • memory/2900-150-0x0000000009DE0000-0x0000000009E76000-memory.dmp

      Filesize

      600KB

    • memory/2900-151-0x0000000009DB0000-0x0000000009DBE000-memory.dmp

      Filesize

      56KB

    • memory/2900-152-0x0000000009E90000-0x0000000009EAA000-memory.dmp

      Filesize

      104KB