Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 01:35
Static task
static1
Behavioral task
behavioral1
Sample
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe
Resource
win7-en-20211208
General
-
Target
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe
-
Size
5.3MB
-
MD5
bba1bdfef7cc8d44ad93a65943263c7d
-
SHA1
c3a3b6690d07c032214ed870d4b6e3a7ad474077
-
SHA256
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554
-
SHA512
0467e862df0d2b2b37b4982dca78f7c8b2079e2060f2252bc3122d9a644292be57372cb4d899a2dfd335093623e133db088b33bc6a9661b5b8453cc341c1c76c
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 13 612 WScript.exe 14 612 WScript.exe 15 612 WScript.exe 16 612 WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 648 sacque.exe 1324 tilmusvp.exe 1188 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exesacque.exetilmusvp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sacque.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sacque.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe -
Loads dropped DLL 10 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exesacque.exetilmusvp.exeDpEditor.exepid process 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe 648 sacque.exe 648 sacque.exe 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe 1324 tilmusvp.exe 1324 tilmusvp.exe 648 sacque.exe 1188 DpEditor.exe 1188 DpEditor.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida \Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida \Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida \Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida behavioral1/memory/648-69-0x0000000001080000-0x0000000001769000-memory.dmp themida behavioral1/memory/648-70-0x0000000001080000-0x0000000001769000-memory.dmp themida behavioral1/memory/648-71-0x0000000001080000-0x0000000001769000-memory.dmp themida behavioral1/memory/1324-72-0x0000000000040000-0x00000000006B4000-memory.dmp themida behavioral1/memory/1324-73-0x0000000000040000-0x00000000006B4000-memory.dmp themida behavioral1/memory/1324-74-0x0000000000040000-0x00000000006B4000-memory.dmp themida \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida \Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/1188-83-0x0000000000800000-0x0000000000EE9000-memory.dmp themida behavioral1/memory/1188-84-0x0000000000800000-0x0000000000EE9000-memory.dmp themida behavioral1/memory/1188-85-0x0000000000800000-0x0000000000EE9000-memory.dmp themida -
Processes:
sacque.exetilmusvp.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sacque.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tilmusvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 648 sacque.exe 1324 tilmusvp.exe 1188 DpEditor.exe -
Drops file in Program Files directory 3 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exedescription ioc process File created C:\Program Files (x86)\foler\olader\adprovider.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe File created C:\Program Files (x86)\foler\olader\acledit.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe File created C:\Program Files (x86)\foler\olader\acppage.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
tilmusvp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tilmusvp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 1188 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 648 sacque.exe 1324 tilmusvp.exe 1188 DpEditor.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exetilmusvp.exesacque.exedescription pid process target process PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 648 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 604 wrote to memory of 1324 604 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 1360 1324 tilmusvp.exe WScript.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 648 wrote to memory of 1188 648 sacque.exe DpEditor.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe PID 1324 wrote to memory of 612 1324 tilmusvp.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe"C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe"C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe"C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xcixgehf.vbs"3⤵PID:1360
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pxkasmasfi.vbs"3⤵
- Blocklisted process makes network request
PID:612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
27bbe1b9f9bd8b1672a9aa5333f8a9dc
SHA1cf1fc69dfd8e7a2ecfa0db8371984e224dc76a09
SHA2563b357b3f4d9816c1b49a36fb69d53aff81a1023c74941392db6dad7ba7215e2a
SHA512d0c64bf79de0c8f950fbd66d032f9e82c9229eefcaf50276fcd47834dbdc5c1b3a9e56d2c46c01fea15515221b81b9d2713ceaccbbd74581ee0dc14a3896d473
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
020999f17de4f117e562f3ede77b17d2
SHA132e57fb81227c56dcc4598c8691b511454b5fba8
SHA256faea12f049cf385fd54c26c196de854f44582846891a11176dfceb8e44856505
SHA512505ef611cddef14fae8f61e75548d85a37051a8d56b94ac795ba398baa32adf817c227e287a68804a610d153ed8e385d51c302936b03fa9bd4ab89959be9b940
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785