Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-02-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
stangs.exe
Resource
win7-en-20211208
General
-
Target
stangs.exe
-
Size
3.3MB
-
MD5
aef3dd554664f1c82a56a2e2775fa6d4
-
SHA1
8456da14bc786bf6ee3fc6ff4ec17665189ea556
-
SHA256
0ef273d54fe7d444cdcd783faa40bba94bad7a85d58ffd94724a5bb6813f0247
-
SHA512
511d5bd264a4808342e1d350f1d731399f11d5da89009820601eb9174ac69b44768b333b08fbab8dc552652ba66b51348eee64023198087d5eeea4e18a5f76e3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
IntelRapid.exepid process 1176 IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
stangs.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion stangs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion stangs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
stangs.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk stangs.exe -
Loads dropped DLL 3 IoCs
Processes:
stangs.exepid process 1668 stangs.exe 1668 stangs.exe 1668 stangs.exe -
Processes:
resource yara_rule behavioral1/memory/1668-56-0x000000013F8C0000-0x00000001401CA000-memory.dmp themida behavioral1/memory/1668-57-0x000000013F8C0000-0x00000001401CA000-memory.dmp themida behavioral1/memory/1668-58-0x000000013F8C0000-0x00000001401CA000-memory.dmp themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral1/memory/1176-64-0x000000013F760000-0x000000014006A000-memory.dmp themida behavioral1/memory/1176-65-0x000000013F760000-0x000000014006A000-memory.dmp themida behavioral1/memory/1176-66-0x000000013F760000-0x000000014006A000-memory.dmp themida -
Processes:
stangs.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA stangs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
stangs.exeIntelRapid.exepid process 1668 stangs.exe 1176 IntelRapid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 1176 IntelRapid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
stangs.exedescription pid process target process PID 1668 wrote to memory of 1176 1668 stangs.exe IntelRapid.exe PID 1668 wrote to memory of 1176 1668 stangs.exe IntelRapid.exe PID 1668 wrote to memory of 1176 1668 stangs.exe IntelRapid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\stangs.exe"C:\Users\Admin\AppData\Local\Temp\stangs.exe"1⤵
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
aef3dd554664f1c82a56a2e2775fa6d4
SHA18456da14bc786bf6ee3fc6ff4ec17665189ea556
SHA2560ef273d54fe7d444cdcd783faa40bba94bad7a85d58ffd94724a5bb6813f0247
SHA512511d5bd264a4808342e1d350f1d731399f11d5da89009820601eb9174ac69b44768b333b08fbab8dc552652ba66b51348eee64023198087d5eeea4e18a5f76e3
-
MD5
aef3dd554664f1c82a56a2e2775fa6d4
SHA18456da14bc786bf6ee3fc6ff4ec17665189ea556
SHA2560ef273d54fe7d444cdcd783faa40bba94bad7a85d58ffd94724a5bb6813f0247
SHA512511d5bd264a4808342e1d350f1d731399f11d5da89009820601eb9174ac69b44768b333b08fbab8dc552652ba66b51348eee64023198087d5eeea4e18a5f76e3
-
MD5
aef3dd554664f1c82a56a2e2775fa6d4
SHA18456da14bc786bf6ee3fc6ff4ec17665189ea556
SHA2560ef273d54fe7d444cdcd783faa40bba94bad7a85d58ffd94724a5bb6813f0247
SHA512511d5bd264a4808342e1d350f1d731399f11d5da89009820601eb9174ac69b44768b333b08fbab8dc552652ba66b51348eee64023198087d5eeea4e18a5f76e3
-
MD5
aef3dd554664f1c82a56a2e2775fa6d4
SHA18456da14bc786bf6ee3fc6ff4ec17665189ea556
SHA2560ef273d54fe7d444cdcd783faa40bba94bad7a85d58ffd94724a5bb6813f0247
SHA512511d5bd264a4808342e1d350f1d731399f11d5da89009820601eb9174ac69b44768b333b08fbab8dc552652ba66b51348eee64023198087d5eeea4e18a5f76e3