Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    10-03-2022 17:27

Errors

Reason
Machine shutdown

General

  • Target

    6A2F6DA502485750ACDE45AD22D36D186C335B2F61592.exe

  • Size

    10.5MB

  • MD5

    e1fad5d61bb637beb30aec6d3180ece2

  • SHA1

    88966028db1eb2a41cec54875486638937a28208

  • SHA256

    6a2f6da502485750acde45ad22d36d186c335b2f61592c5eae168e9f971ffc70

  • SHA512

    5c87ab2570983aff67fe5d99dc157e9ebb040ea96a8344da0f1cdf6fdf9701ee014e43c69255773e95ae09d7c45ece9b119928b45c8fb400351ecccf996a56cb

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6A2F6DA502485750ACDE45AD22D36D186C335B2F61592.exe
    "C:\Users\Admin\AppData\Local\Temp\6A2F6DA502485750ACDE45AD22D36D186C335B2F61592.exe"
    1⤵
    • Drops startup file
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Roaming\Setup.exe
      C:\Users\Admin\AppData\Roaming\Setup.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Roaming\Setup.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3780
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Roaming\Setup.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2424
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Roaming\files"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\AppData\Roaming\files"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1864
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /D /c files.dat -y -pkmsauto
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\Users\Admin\AppData\Roaming\files\files.dat
          files.dat -y -pkmsauto
          4⤵
          • Executes dropped EXE
          PID:4032
    • C:\Users\Admin\AppData\Roaming\conhost.exe
      C:\Users\Admin\AppData\Roaming\conhost.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3200
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x324 0x328
    1⤵
      PID:3188
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3a36055 /state1:0x41c64e6d
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:4052

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Setup.exe
      MD5

      e4a514f71bc9e329c641beb89343bcac

      SHA1

      99dbb79944b2582e1d903acf3499572b8e9a6b86

      SHA256

      f674489ace458373c9c28b60a3afd76f1c4176986d6fb3b51bf0832011c8af4d

      SHA512

      89bebe806976e043d9464074be46c3f8ad7deba3cb20c51eda328f40e9daa84731b9fb83130248c9f69aec50e575a53068233bce77ffc68c1d49736d4dd17c65

    • C:\Users\Admin\AppData\Roaming\Setup.exe
      MD5

      e4a514f71bc9e329c641beb89343bcac

      SHA1

      99dbb79944b2582e1d903acf3499572b8e9a6b86

      SHA256

      f674489ace458373c9c28b60a3afd76f1c4176986d6fb3b51bf0832011c8af4d

      SHA512

      89bebe806976e043d9464074be46c3f8ad7deba3cb20c51eda328f40e9daa84731b9fb83130248c9f69aec50e575a53068233bce77ffc68c1d49736d4dd17c65

    • C:\Users\Admin\AppData\Roaming\conhost.exe
      MD5

      fdbd7b1910d980cf7273796a0119d252

      SHA1

      47029af064a51454662909465ce38ee5cdcc62c7

      SHA256

      3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

      SHA512

      ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

    • C:\Users\Admin\AppData\Roaming\conhost.exe
      MD5

      fdbd7b1910d980cf7273796a0119d252

      SHA1

      47029af064a51454662909465ce38ee5cdcc62c7

      SHA256

      3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

      SHA512

      ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

    • C:\Users\Admin\AppData\Roaming\conhost.exe.manifest
      MD5

      faa0a1da99c41ae839f47795e88ca4cf

      SHA1

      d7b59374b1dd7ae8ff41e0f475716603fda5c803

      SHA256

      9265c14584cbe0be261acb481af9e204bdfda799b45dab3aa04fe30cd348a663

      SHA512

      6f8c5684e3f6ba63974384cc4d4adb0b8d5ecea2d132e1a2f9ab3030c789508e0faa165d1650708a46c52760b8a603f42ed8d366245430b2a54faf9fd1fd17b2

    • C:\Users\Admin\AppData\Roaming\files\files.dat
      MD5

      55d21b2c272a5d6b9f54fa9ed82bf9eb

      SHA1

      32464cba823cd9b7e94e4fa1a32a8f2344b0f33b

      SHA256

      7a1c82e264258470d14ca345ea1a9b6fc34fa19b393a92077a01be5f1ad08f47

      SHA512

      1b68d0c61367717529be4a3aa347bb69d3e21de7a89b10e8b0aa54d40af988cc0cc8e63298ba595a93c3372aca3770ace1eee2780a59238d0948499dbb4be725

    • C:\Users\Admin\AppData\Roaming\files\files.dat
      MD5

      55d21b2c272a5d6b9f54fa9ed82bf9eb

      SHA1

      32464cba823cd9b7e94e4fa1a32a8f2344b0f33b

      SHA256

      7a1c82e264258470d14ca345ea1a9b6fc34fa19b393a92077a01be5f1ad08f47

      SHA512

      1b68d0c61367717529be4a3aa347bb69d3e21de7a89b10e8b0aa54d40af988cc0cc8e63298ba595a93c3372aca3770ace1eee2780a59238d0948499dbb4be725