Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-02-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe
Resource
win7-en-20211208
General
-
Target
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe
-
Size
5.9MB
-
MD5
3919bb58a275715604a36797fce5cc4f
-
SHA1
60c6d11d0401ecf45b760a6c52b947ccca821d8a
-
SHA256
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247
-
SHA512
8af2d40ee99a7ba9a0b7cc8786cf627cab03a5dd7f85cb12a3dc72de678a33094b16a74fb69f7ad98d29a4ec158b312b3fc2749087268a91f83dc825b40c39a7
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 52 1896 WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
searer.exeturneyvp.exeIntelRapid.exepid process 3480 searer.exe 4732 turneyvp.exe 1516 IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
IntelRapid.exesearer.exeturneyvp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion searer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion searer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion turneyvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion turneyvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
turneyvp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation turneyvp.exe -
Drops startup file 1 IoCs
Processes:
searer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk searer.exe -
Loads dropped DLL 1 IoCs
Processes:
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exepid process 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\droopt\searer.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\searer.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\turneyvp.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\turneyvp.exe themida behavioral2/memory/3480-135-0x00007FF6F1240000-0x00007FF6F1B57000-memory.dmp themida behavioral2/memory/4732-137-0x00000000008D0000-0x0000000000F48000-memory.dmp themida behavioral2/memory/3480-136-0x00007FF6F1240000-0x00007FF6F1B57000-memory.dmp themida behavioral2/memory/4732-138-0x00000000008D0000-0x0000000000F48000-memory.dmp themida behavioral2/memory/4732-141-0x00000000008D0000-0x0000000000F48000-memory.dmp themida behavioral2/memory/4732-142-0x00000000008D0000-0x0000000000F48000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral2/memory/1516-145-0x00007FF7A5D00000-0x00007FF7A6617000-memory.dmp themida behavioral2/memory/1516-146-0x00007FF7A5D00000-0x00007FF7A6617000-memory.dmp themida -
Processes:
searer.exeturneyvp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA searer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA turneyvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
searer.exeturneyvp.exeIntelRapid.exepid process 3480 searer.exe 4732 turneyvp.exe 1516 IntelRapid.exe -
Drops file in Program Files directory 3 IoCs
Processes:
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exedescription ioc process File created C:\Program Files (x86)\foler\olader\adprovider.dll 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe File created C:\Program Files (x86)\foler\olader\acppage.dll 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
turneyvp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 turneyvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString turneyvp.exe -
Modifies registry class 1 IoCs
Processes:
turneyvp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings turneyvp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 1516 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
turneyvp.exepid process 4732 turneyvp.exe 4732 turneyvp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 1568 svchost.exe Token: SeCreatePagefilePrivilege 1568 svchost.exe Token: SeShutdownPrivilege 1568 svchost.exe Token: SeCreatePagefilePrivilege 1568 svchost.exe Token: SeShutdownPrivilege 1568 svchost.exe Token: SeCreatePagefilePrivilege 1568 svchost.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe Token: SeRestorePrivilege 2516 TiWorker.exe Token: SeSecurityPrivilege 2516 TiWorker.exe Token: SeBackupPrivilege 2516 TiWorker.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exesearer.exeturneyvp.exedescription pid process target process PID 5028 wrote to memory of 3480 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe searer.exe PID 5028 wrote to memory of 3480 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe searer.exe PID 5028 wrote to memory of 4732 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe turneyvp.exe PID 5028 wrote to memory of 4732 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe turneyvp.exe PID 5028 wrote to memory of 4732 5028 4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe turneyvp.exe PID 3480 wrote to memory of 1516 3480 searer.exe IntelRapid.exe PID 3480 wrote to memory of 1516 3480 searer.exe IntelRapid.exe PID 4732 wrote to memory of 4980 4732 turneyvp.exe WScript.exe PID 4732 wrote to memory of 4980 4732 turneyvp.exe WScript.exe PID 4732 wrote to memory of 4980 4732 turneyvp.exe WScript.exe PID 4732 wrote to memory of 1896 4732 turneyvp.exe WScript.exe PID 4732 wrote to memory of 1896 4732 turneyvp.exe WScript.exe PID 4732 wrote to memory of 1896 4732 turneyvp.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe"C:\Users\Admin\AppData\Local\Temp\4faac433dc2e0494006797d9888d12bd9a53e0f0492774b8f69ddcf0a5f70247.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\droopt\searer.exe"C:\Users\Admin\AppData\Local\Temp\droopt\searer.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\droopt\turneyvp.exe"C:\Users\Admin\AppData\Local\Temp\droopt\turneyvp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\soukndgnivn.vbs"3⤵PID:4980
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bnbmqhaup.vbs"3⤵
- Blocklisted process makes network request
PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5ce902b6833db88a3e3f6c1e546eccf16
SHA1e5e1425d381ae77ccaec7c0d02cb9cc94ba91333
SHA2564d709ebeb223c4310f921382f5fe533fbe45af09b50bc09282f72c61efae4d7f
SHA512f91f3d52e4db450ac28a1191a48d8a4d3cd12591298f42566c0edcccfbb680986bb1bd3da7fc2f88cc8ca62dea6041ce17a1bc5e2810647cef64140333d3960b
-
MD5
eef0cf9997cd701afadbadcfcb16010b
SHA1ebd9d1dabf7260ab1eed299afd591e68b307ca90
SHA256134975ec064b7f7aba29d2af25c1098fc69b73a61bae11a21f2ebc5d42e50496
SHA512f2b26c84224dbb6861320dfab467851b1b2218cede473c353889646ba69fa9505179c24dac548b5741885bd6cc9e373d5c92563edc67029e56c7ecd1a496f7d3
-
MD5
c43f57a26092d31ef02696f8850b4960
SHA15fd387f4f5d73fd84a28c121bff7e0d05b42789e
SHA256dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93
SHA512a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c
-
MD5
c43f57a26092d31ef02696f8850b4960
SHA15fd387f4f5d73fd84a28c121bff7e0d05b42789e
SHA256dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93
SHA512a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c
-
MD5
17e6b50e6b3bd0ed3c3d7bb319e5c3bb
SHA15ee76f504a953ce4d801100a1621033e6c4fe3f6
SHA256561986fd98e2ef79cfab1b7c0ebc4185d4c1b0f101ff10fc086d30fb6f02d283
SHA5126db1eb445485889795196cd87c6631b08b3a9da7c2ca37b7bf806b44ff6f5f37715d2fef6cc29e5a7b5c3995d011b0c610ff7c73a41a5f466f7d9fbe1705920f
-
MD5
17e6b50e6b3bd0ed3c3d7bb319e5c3bb
SHA15ee76f504a953ce4d801100a1621033e6c4fe3f6
SHA256561986fd98e2ef79cfab1b7c0ebc4185d4c1b0f101ff10fc086d30fb6f02d283
SHA5126db1eb445485889795196cd87c6631b08b3a9da7c2ca37b7bf806b44ff6f5f37715d2fef6cc29e5a7b5c3995d011b0c610ff7c73a41a5f466f7d9fbe1705920f
-
MD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
MD5
3f87547dd2d2f468bae2e8513faffd82
SHA167d8c1713601f3526dc42ceb3e9d8b3b6855338d
SHA2566738aac4ea3ba8800daf56621d4d0fd3c8834be0e8bb7f123a259b6ae8ba2b2d
SHA51220afd996d0635e49922ef04941367285183e24128e368cb0e89e082910ea37a0fd591014cc37d86cd2d5c8ec66dbb5cdbf68974fbc533263607ea100271a2ada
-
MD5
c43f57a26092d31ef02696f8850b4960
SHA15fd387f4f5d73fd84a28c121bff7e0d05b42789e
SHA256dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93
SHA512a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c
-
MD5
c43f57a26092d31ef02696f8850b4960
SHA15fd387f4f5d73fd84a28c121bff7e0d05b42789e
SHA256dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93
SHA512a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c