Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-05-2022 22:13

General

  • Target

    ff72b295ded9889cee24320db368bcf1.exe

  • Size

    809KB

  • MD5

    ff72b295ded9889cee24320db368bcf1

  • SHA1

    5d7991f8495d56088710dd558faba639ffd05292

  • SHA256

    e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

  • SHA512

    37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff72b295ded9889cee24320db368bcf1.exe
    "C:\Users\Admin\AppData\Local\Temp\ff72b295ded9889cee24320db368bcf1.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /tn TxMT8hHkO8fBB5FlBurdwljpn /tr "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe" /st 00:18 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:884
    • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\ProgramData\8125412A8A\MOxnfkG4eOfW0IpCi6MLrNgpm6qVgIEfhV3XOHL2\WlaOrzbfdk.exe
        "C:\ProgramData\8125412A8A\MOxnfkG4eOfW0IpCi6MLrNgpm6qVgIEfhV3XOHL2\WlaOrzbfdk.exe" --url xmr.hashcity.org:4444 --user first1805.8125412A8A --pass x --title Service --cpu-max-threads-hint=70 --donate-level 0
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:5904
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA5F9.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\system32\timeout.exe
        timeout 6
        3⤵
        • Delays execution with timeout.exe
        PID:2492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe

    Filesize

    520.0MB

    MD5

    f1d20988b8c185ed3cb4476a8d6cbf5f

    SHA1

    12ba27d6d0962616ee5ad0c5ebe0be950bc8d0af

    SHA256

    0d7fa79285da64985fccf4519582bccaba97f4befac7e40758c5063fcd02033a

    SHA512

    166efdb8876d4c4faad2fd8e3c11840a23f4d40c7d87a4e1d74c452820d937eeeea0d1e6fbcdbb1ee053138dcecf2b77ad933a4b7f0f84541c0ca85a1f50d440

  • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe

    Filesize

    517.8MB

    MD5

    21746de6a989d4047c03e1d71119372e

    SHA1

    a1b093d17369706cded858b2ac87b56d1435cd14

    SHA256

    5a62989f162feea56ed19464b39d7d5c5c849e397728a25aae67fd99879992b1

    SHA512

    99d584faddee2be13c1af5fb3f185f6d869537347cffd5531e24f499322fa51f2c60daac2e685dc6f1870d5859248d14632473ea24a92fa8ba13387a6c175df2

  • C:\ProgramData\8125412A8A\MOxnfkG4eOfW0IpCi6MLrNgpm6qVgIEfhV3XOHL2\WlaOrzbfdk.exe

    Filesize

    21.9MB

    MD5

    7a0b6ff6dd4f76c8c696c5c35487db0a

    SHA1

    9d8319b0bfbd8356bf08bde124a955d4490a3632

    SHA256

    7d722f96dad1f545aefaab52e3dd6192f9e79fd9bd2631b58f98dfe7f6ca9761

    SHA512

    b8cf91ab2ba9d766e5ea02509dcafbee3e363bfe647b8ac2b2e1c91e844b1f629a348fa69e93a5b991dd97bd8759435a8f02e0e9a5018e4e39e08af090d64ac2

  • C:\Users\Admin\AppData\Local\Temp\tmpA5F9.tmp.bat

    Filesize

    184B

    MD5

    f910fcfde0f23523339c1fedacd66506

    SHA1

    2199431534d22e44db1fb66587cb79c5f2e6442c

    SHA256

    5c2ff910efca65a9c94577ba52c8f8dc4df12e51ab041a422be4ceb954729a89

    SHA512

    fcded8e20818bb85d5010d7c426502f97622ea7e24ad821a926ec5a6e781761cd3e384ce804d701d7ad0f50a70f8d3faa62d27da3e73d2b14b6f21cee2332c24

  • memory/548-139-0x00007FFE09260000-0x00007FFE09D21000-memory.dmp

    Filesize

    10.8MB

  • memory/548-140-0x000000001C5BA000-0x000000001C5BF000-memory.dmp

    Filesize

    20KB

  • memory/4068-130-0x0000000000790000-0x000000000085E000-memory.dmp

    Filesize

    824KB

  • memory/4068-131-0x00007FFE09260000-0x00007FFE09D21000-memory.dmp

    Filesize

    10.8MB

  • memory/5904-143-0x00000000019A0000-0x00000000019C0000-memory.dmp

    Filesize

    128KB

  • memory/5904-144-0x00007FFE26FB0000-0x00007FFE271A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5904-145-0x0000000001A20000-0x0000000001A60000-memory.dmp

    Filesize

    256KB