Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe
Resource
win7-en-20211208
General
-
Target
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe
-
Size
6.0MB
-
MD5
a2d41440e015f546c646d23e96bba3fb
-
SHA1
d42da38f61490026b421d5ac37618f84978fa42e
-
SHA256
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648
-
SHA512
7fc71dcef3f8e33b0b31e5611bcdbea4db0e43833df0daf9a798206baf5574a09a14c7e9e1a3496404e22fca2993eb654748879bf8ce040a1b5e08f3d1902b94
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 13 2000 WScript.exe 14 2000 WScript.exe 15 2000 WScript.exe 16 2000 WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
bescab.exechawervp.exeIntelRapid.exepid process 672 bescab.exe 1208 chawervp.exe 832 IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bescab.exechawervp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bescab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bescab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chawervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chawervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
bescab.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk bescab.exe -
Loads dropped DLL 9 IoCs
Processes:
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exechawervp.exebescab.exepid process 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe 1208 chawervp.exe 1208 chawervp.exe 672 bescab.exe 672 bescab.exe 672 bescab.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\runkly\bescab.exe themida \Users\Admin\AppData\Local\Temp\runkly\bescab.exe themida C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exe themida \Users\Admin\AppData\Local\Temp\runkly\chawervp.exe themida C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exe themida \Users\Admin\AppData\Local\Temp\runkly\chawervp.exe themida C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exe themida \Users\Admin\AppData\Local\Temp\runkly\chawervp.exe themida behavioral1/memory/672-66-0x000000013F9E0000-0x0000000140343000-memory.dmp themida behavioral1/memory/1208-68-0x00000000009B0000-0x000000000101E000-memory.dmp themida behavioral1/memory/672-69-0x000000013F9E0000-0x0000000140343000-memory.dmp themida behavioral1/memory/1208-71-0x00000000009B0000-0x000000000101E000-memory.dmp themida behavioral1/memory/672-72-0x000000013F9E0000-0x0000000140343000-memory.dmp themida behavioral1/memory/1208-73-0x00000000009B0000-0x000000000101E000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral1/memory/832-80-0x000000013F1B0000-0x000000013FB13000-memory.dmp themida behavioral1/memory/832-81-0x000000013F1B0000-0x000000013FB13000-memory.dmp themida behavioral1/memory/832-82-0x000000013F1B0000-0x000000013FB13000-memory.dmp themida -
Processes:
chawervp.exeIntelRapid.exebescab.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chawervp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bescab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
bescab.exechawervp.exeIntelRapid.exepid process 672 bescab.exe 1208 chawervp.exe 832 IntelRapid.exe -
Drops file in Program Files directory 3 IoCs
Processes:
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
chawervp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chawervp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString chawervp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 832 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
chawervp.exepid process 1208 chawervp.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exebescab.exechawervp.exedescription pid process target process PID 1732 wrote to memory of 672 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe bescab.exe PID 1732 wrote to memory of 672 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe bescab.exe PID 1732 wrote to memory of 672 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe bescab.exe PID 1732 wrote to memory of 672 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe bescab.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 1732 wrote to memory of 1208 1732 488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe chawervp.exe PID 672 wrote to memory of 832 672 bescab.exe IntelRapid.exe PID 672 wrote to memory of 832 672 bescab.exe IntelRapid.exe PID 672 wrote to memory of 832 672 bescab.exe IntelRapid.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 1776 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe PID 1208 wrote to memory of 2000 1208 chawervp.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe"C:\Users\Admin\AppData\Local\Temp\488c8ca1ddf12bd8a8a137cedc546c17b436839a1c91382bb6e6f3e333a63648.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exe"C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exe"C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\luutepv.vbs"3⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wvuyylhnruy.vbs"3⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\luutepv.vbsMD5
42b511b2742203ec4797dfd86a3cf7c4
SHA1673ecb5a039f20aac8128f2a2cddd7085f2e7ceb
SHA256bf1b33e6c1d90099f06d191813a97c42add8693773a6c4c7a4018abe26990a37
SHA512f77084d775676cce0507dad43ba5f0b75ad7ba4a3fff514ebbbf14c4b023631689a3ff83816a8f57f49448900a6ef9cc18f9837f3afcee2fae4f3264e28fd3f3
-
C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
C:\Users\Admin\AppData\Local\Temp\runkly\bescab.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exeMD5
2ca1fa563d961e96561622edcab5d864
SHA1d9fcd898fe5ddc4a19ae97a6c4ff1f2664a808ac
SHA256dc0b3b9b3bdc64d5074f2126ed397258effa721601c645428bcc653b8cdf2f4e
SHA512916443f39a0e14431b369a6b9c8d37ab12689559f39f3bbd0f9988aa17db2a914c01c9e14cbf7be92146427046e81c76e3dc91f1e767428079c60956e1414b7d
-
C:\Users\Admin\AppData\Local\Temp\runkly\chawervp.exeMD5
2ca1fa563d961e96561622edcab5d864
SHA1d9fcd898fe5ddc4a19ae97a6c4ff1f2664a808ac
SHA256dc0b3b9b3bdc64d5074f2126ed397258effa721601c645428bcc653b8cdf2f4e
SHA512916443f39a0e14431b369a6b9c8d37ab12689559f39f3bbd0f9988aa17db2a914c01c9e14cbf7be92146427046e81c76e3dc91f1e767428079c60956e1414b7d
-
C:\Users\Admin\AppData\Local\Temp\wvuyylhnruy.vbsMD5
ba8482bb107e60fa57b2f6a3865bcc22
SHA160aa5eae3394170ff368c7ce9ce9fe3d6fba8507
SHA256c05de7cb0ac3f3b6552b57c83f1788f7c8451ec4813e3f23233447ec041e6d68
SHA5123aca0d3358a0487cb2b7edc5cdee89048e34ea56239bb0f760e4ce3ec39bc50d6a7da4e8379c3b811bf0d3a7bb2697d74c9fdff118a564a88ae6881823a8542d
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
\Users\Admin\AppData\Local\Temp\nso6E3E.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
\Users\Admin\AppData\Local\Temp\runkly\bescab.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
\Users\Admin\AppData\Local\Temp\runkly\bescab.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
\Users\Admin\AppData\Local\Temp\runkly\chawervp.exeMD5
2ca1fa563d961e96561622edcab5d864
SHA1d9fcd898fe5ddc4a19ae97a6c4ff1f2664a808ac
SHA256dc0b3b9b3bdc64d5074f2126ed397258effa721601c645428bcc653b8cdf2f4e
SHA512916443f39a0e14431b369a6b9c8d37ab12689559f39f3bbd0f9988aa17db2a914c01c9e14cbf7be92146427046e81c76e3dc91f1e767428079c60956e1414b7d
-
\Users\Admin\AppData\Local\Temp\runkly\chawervp.exeMD5
2ca1fa563d961e96561622edcab5d864
SHA1d9fcd898fe5ddc4a19ae97a6c4ff1f2664a808ac
SHA256dc0b3b9b3bdc64d5074f2126ed397258effa721601c645428bcc653b8cdf2f4e
SHA512916443f39a0e14431b369a6b9c8d37ab12689559f39f3bbd0f9988aa17db2a914c01c9e14cbf7be92146427046e81c76e3dc91f1e767428079c60956e1414b7d
-
\Users\Admin\AppData\Local\Temp\runkly\chawervp.exeMD5
2ca1fa563d961e96561622edcab5d864
SHA1d9fcd898fe5ddc4a19ae97a6c4ff1f2664a808ac
SHA256dc0b3b9b3bdc64d5074f2126ed397258effa721601c645428bcc653b8cdf2f4e
SHA512916443f39a0e14431b369a6b9c8d37ab12689559f39f3bbd0f9988aa17db2a914c01c9e14cbf7be92146427046e81c76e3dc91f1e767428079c60956e1414b7d
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
7353d83c321cb341abed242c33856850
SHA110207907f7cc70fc0735c0415f21590775fff835
SHA25621a8f01c939e887621a2e3b25ab165a135a842a695fbaec75a1cf13a67fabd37
SHA512275e19eaad5bdd067694d96e5bfe5e27079b6bfd8953ce3519fa5cb80a8b62add21c453a81a9bf7845dad0801871297db2d3de740ef8c74ef718faef5430544c
-
memory/672-72-0x000000013F9E0000-0x0000000140343000-memory.dmpFilesize
9.4MB
-
memory/672-66-0x000000013F9E0000-0x0000000140343000-memory.dmpFilesize
9.4MB
-
memory/672-69-0x000000013F9E0000-0x0000000140343000-memory.dmpFilesize
9.4MB
-
memory/672-75-0x000007FEFB801000-0x000007FEFB803000-memory.dmpFilesize
8KB
-
memory/672-67-0x0000000076FD0000-0x0000000076FD2000-memory.dmpFilesize
8KB
-
memory/832-80-0x000000013F1B0000-0x000000013FB13000-memory.dmpFilesize
9.4MB
-
memory/832-81-0x000000013F1B0000-0x000000013FB13000-memory.dmpFilesize
9.4MB
-
memory/832-82-0x000000013F1B0000-0x000000013FB13000-memory.dmpFilesize
9.4MB
-
memory/1208-70-0x0000000077170000-0x0000000077172000-memory.dmpFilesize
8KB
-
memory/1208-71-0x00000000009B0000-0x000000000101E000-memory.dmpFilesize
6.4MB
-
memory/1208-68-0x00000000009B0000-0x000000000101E000-memory.dmpFilesize
6.4MB
-
memory/1208-73-0x00000000009B0000-0x000000000101E000-memory.dmpFilesize
6.4MB
-
memory/1732-55-0x0000000074F11000-0x0000000074F13000-memory.dmpFilesize
8KB