Analysis

  • max time kernel
    173s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    15-02-2022 18:04

General

  • Target

    b0429bd948c05044a9bb367e16bf30586ea495f4788c1e7a63ae4b5464f29cd1.exe

  • Size

    858KB

  • MD5

    248ead3f5f4151f8b6c0daca1f774b4a

  • SHA1

    14242a6c2381629ba506c1eb515f30dc4a7e5bc4

  • SHA256

    b0429bd948c05044a9bb367e16bf30586ea495f4788c1e7a63ae4b5464f29cd1

  • SHA512

    c3c90b53d415d2e2cd6c1f7c02c5d665c95c0f92db14164ee2cd7edef1e90dddcc8d78ab6ec3eaaa0311e1d1876d0b7d94ea3f802b88c8f2416ca0c0c9af1977

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0429bd948c05044a9bb367e16bf30586ea495f4788c1e7a63ae4b5464f29cd1.exe
    "C:\Users\Admin\AppData\Local\Temp\b0429bd948c05044a9bb367e16bf30586ea495f4788c1e7a63ae4b5464f29cd1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:1832
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Apparire.xls
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /FI "imagename eq BullGuardCore.exe"
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2608
          • C:\Windows\SysWOW64\find.exe
            find /I /N "bullguardcore.exe"
            4⤵
              PID:2452
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FI "imagename eq PSUAService.exe"
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1396
            • C:\Windows\SysWOW64\find.exe
              find /I /N "psuaservice.exe"
              4⤵
                PID:224
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^wrnCdnqmuSYKhRoHOYhpaYfkIIZoVapMfaTFXxbOOavoCSixBhvmeVPeNhUHmRENJkcVXCKxAnxqCiIPAEHIWJKzCRS$" Moto.xls
                4⤵
                  PID:532
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Venir.exe.pif
                  Venir.exe.pif k
                  4⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:1132
                  • C:\Users\Admin\AppData\Local\Temp\File1.exe
                    "C:\Users\Admin\AppData\Local\Temp\File1.exe"
                    5⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Drops startup file
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious use of WriteProcessMemory
                    PID:3484
                    • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
                      "C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"
                      6⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: AddClipboardFormatListener
                      PID:1608
                • C:\Windows\SysWOW64\waitfor.exe
                  waitfor /t 5 BSUQo
                  4⤵
                    PID:836
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
              1⤵
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:1848
            • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
              C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
              1⤵
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:3632

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Apparire.xls

              MD5

              7d05b50377ca99ac50c5948fc93183d8

              SHA1

              4a79220f4f000a44e79d92a0e08a45d175ec1194

              SHA256

              2202ec18f9e377506110b7f69b7d834de05c1f5a74af74cde371fa79f65cbbfc

              SHA512

              333bcd576088ef449cfb083545b9fd8dd49f365ec1a75a2a6692e2b197e49e23f16c036e1b3f79603651c01439bacbd6426fd5513bbc9716402aad1ae6d92bfb

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Moto.xls

              MD5

              579e203e3d222f8eb222c4c505c63359

              SHA1

              85901ad211654a42d008113da6acfb88b871676e

              SHA256

              34b239e6627f04504eac2ce51184407bbe72afa45ad794ef31da427883bdf694

              SHA512

              42141a66635a6d6206e947408857cb46ca5f66d0d05b6f06a7e046d3e6e330264c2df627365057f9302e27697cd8ff08139242da29d333cbce29f851f4b7d6ea

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sussulto.xls

              MD5

              a51e9eb34690adb2c91a2dff7f62d1e1

              SHA1

              cce892a70783af9533554f423a5e6619a4099132

              SHA256

              bb3c7cfdf4690557f17203cf9a7098c720ebe3c289c965a000694bd0a131a833

              SHA512

              51fad0f6756b718055e9ab9dce68df199822296a3b16243d2a2d626382df95d33901ae51f489182f39eafd984d17a83e671b14fac64ed8e583b3fd4dc522f325

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Venir.exe.pif

              MD5

              c56b5f0201a3b3de53e561fe76912bfd

              SHA1

              2a4062e10a5de813f5688221dbeb3f3ff33eb417

              SHA256

              237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

              SHA512

              195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\iJyTLu.dll

              MD5

              4f3387277ccbd6d1f21ac5c07fe4ca68

              SHA1

              e16506f662dc92023bf82def1d621497c8ab5890

              SHA256

              767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

              SHA512

              9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

            • C:\Users\Admin\AppData\Local\Temp\File1.exe

              MD5

              c2500e12dd398013b97d883a822efd31

              SHA1

              5daa6d9a1404ab117c359bee55b8c1397fc549a6

              SHA256

              4ca1a5e5313c4aa1b333bf81ea1533cebe01460547a1e382b7311d28de07bbd6

              SHA512

              9b61bda8d30401a369cc3edb40a7a36b8d477b474698aacdfeb0a54f000c810632deb3bdeef513475f5ca7955d06d59f7fd19d532884250685fecd9d588d5897

            • C:\Users\Admin\AppData\Local\Temp\File1.exe

              MD5

              c2500e12dd398013b97d883a822efd31

              SHA1

              5daa6d9a1404ab117c359bee55b8c1397fc549a6

              SHA256

              4ca1a5e5313c4aa1b333bf81ea1533cebe01460547a1e382b7311d28de07bbd6

              SHA512

              9b61bda8d30401a369cc3edb40a7a36b8d477b474698aacdfeb0a54f000c810632deb3bdeef513475f5ca7955d06d59f7fd19d532884250685fecd9d588d5897

            • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe

              MD5

              c2500e12dd398013b97d883a822efd31

              SHA1

              5daa6d9a1404ab117c359bee55b8c1397fc549a6

              SHA256

              4ca1a5e5313c4aa1b333bf81ea1533cebe01460547a1e382b7311d28de07bbd6

              SHA512

              9b61bda8d30401a369cc3edb40a7a36b8d477b474698aacdfeb0a54f000c810632deb3bdeef513475f5ca7955d06d59f7fd19d532884250685fecd9d588d5897

            • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe

              MD5

              c2500e12dd398013b97d883a822efd31

              SHA1

              5daa6d9a1404ab117c359bee55b8c1397fc549a6

              SHA256

              4ca1a5e5313c4aa1b333bf81ea1533cebe01460547a1e382b7311d28de07bbd6

              SHA512

              9b61bda8d30401a369cc3edb40a7a36b8d477b474698aacdfeb0a54f000c810632deb3bdeef513475f5ca7955d06d59f7fd19d532884250685fecd9d588d5897

            • memory/1132-145-0x0000000004831000-0x0000000004839000-memory.dmp

              Filesize

              32KB

            • memory/1608-153-0x00007FF7E64B0000-0x00007FF7E6DD7000-memory.dmp

              Filesize

              9.2MB

            • memory/1608-154-0x00007FF7E64B0000-0x00007FF7E6DD7000-memory.dmp

              Filesize

              9.2MB

            • memory/1848-136-0x0000012488A00000-0x0000012488A04000-memory.dmp

              Filesize

              16KB

            • memory/1848-135-0x0000012486320000-0x0000012486330000-memory.dmp

              Filesize

              64KB

            • memory/1848-134-0x0000012485D80000-0x0000012485D90000-memory.dmp

              Filesize

              64KB

            • memory/3484-150-0x00007FFC20410000-0x00007FFC20412000-memory.dmp

              Filesize

              8KB

            • memory/3484-149-0x00007FF6EB0A0000-0x00007FF6EB9C7000-memory.dmp

              Filesize

              9.2MB

            • memory/3484-148-0x00007FF6EB0A0000-0x00007FF6EB9C7000-memory.dmp

              Filesize

              9.2MB