Analysis

  • max time kernel
    158s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    15-02-2022 10:44

General

  • Target

    3d19bf2c34c0a658803fd2b97e5ec3290498f5f33498b5f529e66c6a3f28fff2.exe

  • Size

    1.2MB

  • MD5

    6cfa223ff643d058218d1f12b57d26a7

  • SHA1

    ad3f357f1fe4ebdea553165f9066650adae0b962

  • SHA256

    3d19bf2c34c0a658803fd2b97e5ec3290498f5f33498b5f529e66c6a3f28fff2

  • SHA512

    b3ccc45e1bd360c17c886ae3f4e0895709885f1d1769e15738e497efc01bc66151b488a1c6c69d03f7b80ea844dc3fee9d9f22b5ad40db5a0757738adfe3d2cb

Score
9/10

Malware Config

Signatures

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d19bf2c34c0a658803fd2b97e5ec3290498f5f33498b5f529e66c6a3f28fff2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d19bf2c34c0a658803fd2b97e5ec3290498f5f33498b5f529e66c6a3f28fff2.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EpWPvCwTKb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6DFF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp6DFF.tmp

    MD5

    b0c68f62f5faab8b0396dee5d05859a6

    SHA1

    75049e08bf9176799d032ddd434ba6b4df77ec92

    SHA256

    482fe2855d66934f26f7f1d9cb6040ff44d406f177fd40572ea1cd0102a14ee8

    SHA512

    f9f463ab685cc16014b612d010da755c853df0cac62ada381010ab157c090084fcab8ea4c2d6d565361b8cf2e8823e64586c0f98448de2b071efbb1659a92570

  • memory/1532-55-0x00000000741FE000-0x00000000741FF000-memory.dmp

    Filesize

    4KB

  • memory/1532-56-0x0000000000170000-0x000000000029E000-memory.dmp

    Filesize

    1.2MB

  • memory/1532-57-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

    Filesize

    4KB

  • memory/1532-58-0x0000000000550000-0x0000000000564000-memory.dmp

    Filesize

    80KB

  • memory/1532-59-0x0000000005840000-0x0000000005904000-memory.dmp

    Filesize

    784KB