Analysis

  • max time kernel
    201s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 03:12

General

  • Target

    b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5.exe

  • Size

    126KB

  • MD5

    a7d8623641334264d5121b591b9457d2

  • SHA1

    f8715898b74cc0bb19f085b7c8759462f3b7d3b3

  • SHA256

    b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5

  • SHA512

    025339f40f2249d11ca45d7dc4f04f7e698aa32f47c9af09f616bbd5c4d0fc3f9f05b0327cc5de14150762acab2afc3290b573bdb199e3c438e8e5d9a0a0dcf7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2096
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup
      1⤵
        PID:2112
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2156
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2620
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
            1⤵
              PID:2416
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:2888
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:2728
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3460
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:3108
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3032
                      • C:\Users\Admin\AppData\Local\Temp\b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5.exe
                        "C:\Users\Admin\AppData\Local\Temp\b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5.exe"
                        1⤵
                        • Checks computer location settings
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1556
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5.exe" /f /reg:64
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:364
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b11b2876e9b920084435e7e58dc9f7e1ea2cc82f5eeaee3aa90b684c39ce49c5.exe" /f /reg:64
                            3⤵
                            • Adds Run key to start application
                            PID:2912
                      • C:\Windows\system32\MusNotifyIcon.exe
                        %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
                        1⤵
                        • Checks processor information in registry
                        PID:3560
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k NetworkService -p
                        1⤵
                        • Drops file in Windows directory
                        • Modifies data under HKEY_USERS
                        PID:3696
                      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                        1⤵
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3532

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      1
                      T1112

                      Discovery

                      Query Registry

                      2
                      T1012

                      System Information Discovery

                      3
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads