Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 01:35
Static task
static1
Behavioral task
behavioral1
Sample
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe
Resource
win7-en-20211208
General
-
Target
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe
-
Size
5.3MB
-
MD5
bba1bdfef7cc8d44ad93a65943263c7d
-
SHA1
c3a3b6690d07c032214ed870d4b6e3a7ad474077
-
SHA256
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554
-
SHA512
0467e862df0d2b2b37b4982dca78f7c8b2079e2060f2252bc3122d9a644292be57372cb4d899a2dfd335093623e133db088b33bc6a9661b5b8453cc341c1c76c
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 43 3944 WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 1648 sacque.exe 2008 tilmusvp.exe 5080 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
tilmusvp.exeDpEditor.exesacque.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sacque.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sacque.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tilmusvp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation tilmusvp.exe -
Loads dropped DLL 1 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exepid process 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe themida behavioral2/memory/1648-136-0x0000000000370000-0x0000000000A59000-memory.dmp themida behavioral2/memory/2008-138-0x00000000007D0000-0x0000000000E44000-memory.dmp themida behavioral2/memory/1648-137-0x0000000000370000-0x0000000000A59000-memory.dmp themida behavioral2/memory/2008-139-0x00000000007D0000-0x0000000000E44000-memory.dmp themida behavioral2/memory/1648-140-0x0000000000370000-0x0000000000A59000-memory.dmp themida behavioral2/memory/2008-141-0x00000000007D0000-0x0000000000E44000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral2/memory/5080-148-0x0000000000180000-0x0000000000869000-memory.dmp themida behavioral2/memory/5080-149-0x0000000000180000-0x0000000000869000-memory.dmp themida behavioral2/memory/5080-150-0x0000000000180000-0x0000000000869000-memory.dmp themida -
Processes:
sacque.exetilmusvp.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sacque.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tilmusvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 1648 sacque.exe 2008 tilmusvp.exe 5080 DpEditor.exe -
Drops file in Program Files directory 3 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe File created C:\Program Files (x86)\foler\olader\acledit.dll a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
tilmusvp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tilmusvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tilmusvp.exe -
Modifies registry class 1 IoCs
Processes:
tilmusvp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings tilmusvp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 5080 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
sacque.exetilmusvp.exeDpEditor.exepid process 1648 sacque.exe 1648 sacque.exe 2008 tilmusvp.exe 2008 tilmusvp.exe 5080 DpEditor.exe 5080 DpEditor.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 444 svchost.exe Token: SeCreatePagefilePrivilege 444 svchost.exe Token: SeShutdownPrivilege 444 svchost.exe Token: SeCreatePagefilePrivilege 444 svchost.exe Token: SeShutdownPrivilege 444 svchost.exe Token: SeCreatePagefilePrivilege 444 svchost.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe Token: SeRestorePrivilege 1400 TiWorker.exe Token: SeSecurityPrivilege 1400 TiWorker.exe Token: SeBackupPrivilege 1400 TiWorker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exetilmusvp.exesacque.exedescription pid process target process PID 5056 wrote to memory of 1648 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 5056 wrote to memory of 1648 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 5056 wrote to memory of 1648 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe sacque.exe PID 5056 wrote to memory of 2008 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 5056 wrote to memory of 2008 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 5056 wrote to memory of 2008 5056 a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe tilmusvp.exe PID 2008 wrote to memory of 384 2008 tilmusvp.exe WScript.exe PID 2008 wrote to memory of 384 2008 tilmusvp.exe WScript.exe PID 2008 wrote to memory of 384 2008 tilmusvp.exe WScript.exe PID 1648 wrote to memory of 5080 1648 sacque.exe DpEditor.exe PID 1648 wrote to memory of 5080 1648 sacque.exe DpEditor.exe PID 1648 wrote to memory of 5080 1648 sacque.exe DpEditor.exe PID 2008 wrote to memory of 3944 2008 tilmusvp.exe WScript.exe PID 2008 wrote to memory of 3944 2008 tilmusvp.exe WScript.exe PID 2008 wrote to memory of 3944 2008 tilmusvp.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe"C:\Users\Admin\AppData\Local\Temp\a6dbadcf01250b7cb443bc3db5cde3355ea831bccf4d9f72c9d6bd2c11677554.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe"C:\Users\Admin\AppData\Local\Temp\tongan\sacque.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe"C:\Users\Admin\AppData\Local\Temp\tongan\tilmusvp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pryqpgenup.vbs"3⤵PID:384
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ajqjmlwxjle.vbs"3⤵
- Blocklisted process makes network request
PID:3944
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:444
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5b3ba2d9d6f7d2f82ee2e0a13fbb80bd4
SHA190cd876f6f356dff3fcf6ae4893a20ac42463776
SHA2563e18c99461226fff5f590b4a449941fb5a416854b677afbc8b4da0fed1dc397e
SHA5125a210d8292280f23383947e746c0d1c1ecc7d2fd241d1f655cb67085f49dc46120ac7a2783c798a3fd9cdc23d6b77ea0b55cd363867c015195b77d35d4e7cce5
-
MD5
cabb587feb7786fc02fbfe49054d99fe
SHA1e9bb3124135f18dc9227c260aa758a0f7950a41d
SHA256050b0214122363a9f3f2dfd71976966d3b96e8defe7cf3a006fa8d2993a132a1
SHA512fd55ab572a06abb37b972169b68baa06d1bdb4f81d94d1036642c5b41ca373c4d8caeed8cc77227a773a019901cf0a298a9d93fa4c564d7cb856924b50198993
-
MD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
MD5
ad3fc7b14d06ddff8f7f54c456714907
SHA1f0b22111d055d730ee84682c54bd53cd384a8db9
SHA25635d47b75e04a7affcafffc62eb44a6f8650dd59daabb3576c75d0cad61b94e8b
SHA5120deef89bbb9a9d2859afa4596e680f73cf9aed92b8673014b72de79c659f7a04c7e5cf44963bb059b60160a236c2c88769cf4fe827a6fa2b8d933828e271bf7e
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
a6026b1816d99fddc64093331fbbcb06
SHA18882f31a568642bbc68294001187a90166c188a0
SHA25631e3fb9f538ac8e99c37516e1fdbb39ecefa156fb351d1f3c7b1769630502554
SHA5124ebc406781d91601ba3277aa21737d6e434c21bd42f2d3260ce7d90bfb1458d140e2842efc85866f5c330847a71dfe302f842b782238d6422fa160e5047ada00
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785
-
MD5
47d659b3fa14c54b9700012da8cf2d92
SHA1da9a4a73ad5a6d9d71750c9e3684bfbca25b7b2a
SHA256c3d4a3acdf7e36217b4b9799b5f34f1302e57c3406656ef74c8ed6c4ef30b641
SHA5120eec877866ab22b18cc6a826865a6227a189eb28c65562a469ed9821d26dcf8f0bf9fd27c106e3f717360008cd596ec9fe4452545812726be5434350611c1785