Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 01:35

General

  • Target

    a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe

  • Size

    5.3MB

  • MD5

    bba1bdfef7cc8d44ad93a65943263c7d

  • SHA1

    c3a3b6690d07c032214ed870d4b6e3a7ad474077

  • SHA256

    a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554

  • SHA512

    0467e862df0d2b2b37b4982dca78f7c8b2079e2060f2252bc3122d9a644292be57372cb4d899a2dfd335093623e133db088b33bc6a9661b5b8453cc341c1c76c

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 10 IoCs
  • Themida packer 24 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe
    "C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      "C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
        "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        PID:1188
    • C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      "C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xcixgehf.vbs"
        3⤵
          PID:1360
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pxkasmasfi.vbs"
          3⤵
          • Blocklisted process makes network request
          PID:612

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\pxkasmasfi.vbs
      MD5

      27bbe1b9f9bd8b1672a9aa5333f8a9dc

      SHA1

      cf1fc69dfd8e7a2ecfa0db8371984e224dc76a09

      SHA256

      3b357b3f4d9816c1b49a36fb69d53aff81a1023c74941392db6dad7ba7215e2a

      SHA512

      d0c64bf79de0c8f950fbd66d032f9e82c9229eefcaf50276fcd47834dbdc5c1b3a9e56d2c46c01fea15515221b81b9d2713ceaccbbd74581ee0dc14a3896d473

    • C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      MD5

      a6026b1816d99fddc64093331fbbcb06

      SHA1

      8882f31a568642bbc68294001187a90166c188a0

      SHA256

      31e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554

      SHA512

      4ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00

    • C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      MD5

      a6026b1816d99fddc64093331fbbcb06

      SHA1

      8882f31a568642bbc68294001187a90166c188a0

      SHA256

      31e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554

      SHA512

      4ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00

    • C:\Users\Admin\AppData\Local\Temp\xcixgehf.vbs
      MD5

      020999f17de4f117e562f3ede77b17d2

      SHA1

      32e57fb81227c56dcc4598c8691b511454b5fba8

      SHA256

      faea12f049cf385fd54c26c196de854f44582846891a11176dfceb8e44856505

      SHA512

      505ef611cddef14fae8f61e75548d85a37051a8d56b94ac795ba398baa32adf817c227e287a68804a610d153ed8e385d51c302936b03fa9bd4ab89959be9b940

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Local\Temp\nsiB961.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • \Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Local\Temp\tongan\sacque.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      MD5

      a6026b1816d99fddc64093331fbbcb06

      SHA1

      8882f31a568642bbc68294001187a90166c188a0

      SHA256

      31e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554

      SHA512

      4ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00

    • \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      MD5

      a6026b1816d99fddc64093331fbbcb06

      SHA1

      8882f31a568642bbc68294001187a90166c188a0

      SHA256

      31e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554

      SHA512

      4ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00

    • \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe
      MD5

      a6026b1816d99fddc64093331fbbcb06

      SHA1

      8882f31a568642bbc68294001187a90166c188a0

      SHA256

      31e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554

      SHA512

      4ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      47d659b3fa14c54b9700012da8cf2d92

      SHA1

      da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a

      SHA256

      c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641

      SHA512

      0eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785

    • memory/604-54-0x0000000075191000-0x0000000075193000-memory.dmp
      Filesize

      8KB

    • memory/648-68-0x0000000076EA0000-0x0000000076EA2000-memory.dmp
      Filesize

      8KB

    • memory/648-71-0x0000000001080000-0x0000000001769000-memory.dmp
      Filesize

      6.9MB

    • memory/648-70-0x0000000001080000-0x0000000001769000-memory.dmp
      Filesize

      6.9MB

    • memory/648-69-0x0000000001080000-0x0000000001769000-memory.dmp
      Filesize

      6.9MB

    • memory/1188-83-0x0000000000800000-0x0000000000EE9000-memory.dmp
      Filesize

      6.9MB

    • memory/1188-84-0x0000000000800000-0x0000000000EE9000-memory.dmp
      Filesize

      6.9MB

    • memory/1188-85-0x0000000000800000-0x0000000000EE9000-memory.dmp
      Filesize

      6.9MB

    • memory/1324-74-0x0000000000040000-0x00000000006B4000-memory.dmp
      Filesize

      6.5MB

    • memory/1324-73-0x0000000000040000-0x00000000006B4000-memory.dmp
      Filesize

      6.5MB

    • memory/1324-72-0x0000000000040000-0x00000000006B4000-memory.dmp
      Filesize

      6.5MB