Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-05-2022 14:30

General

  • Target

    be75e9e51767b5a59536afbbf9ffafbc.exe

  • Size

    810KB

  • MD5

    be75e9e51767b5a59536afbbf9ffafbc

  • SHA1

    78be65d86a6918643092e8e90fd72ad3b9ab997f

  • SHA256

    30a4788b9d7eb3c50403737f4af3882b79ba75b8201d53aefb359336f5763745

  • SHA512

    4e9f7198dd12adeb21669f74e1cdebe16ac7ccae8e1f29b537438239d1a240a8f1ab890afebe8c1f8603909a1c72b8ce7e7c981f2147fa53dccc6c43b6a3d9e6

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe
    "C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /tn HGRAyZk0Y950ZeEUrPGcT36so /tr "C:\ProgramData\test\test.exe" /st 14:35 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:2260
    • C:\ProgramData\test\test.exe
      "C:\ProgramData\test\test.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      PID:1048
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF225.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\system32\timeout.exe
        timeout 6
        3⤵
        • Delays execution with timeout.exe
        PID:2984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\test\test.exe

    Filesize

    645.3MB

    MD5

    8d3c8ff40b959b614b9857f998073e3d

    SHA1

    7edc891b06d94ee04a6c070466b7a0eb1809850b

    SHA256

    31a565d9d3567700091c306cc9c893c548a326074849eacdb59f6e79eec48036

    SHA512

    46c4a07297edb0dd467f666c6133cf80e995054512f1a5957b0660bf5862d1ad27dc31e63cc8e618ce37ee0983d695567497f88f7a746b1c29899a7adef199f2

  • C:\ProgramData\test\test.exe

    Filesize

    645.3MB

    MD5

    8d3c8ff40b959b614b9857f998073e3d

    SHA1

    7edc891b06d94ee04a6c070466b7a0eb1809850b

    SHA256

    31a565d9d3567700091c306cc9c893c548a326074849eacdb59f6e79eec48036

    SHA512

    46c4a07297edb0dd467f666c6133cf80e995054512f1a5957b0660bf5862d1ad27dc31e63cc8e618ce37ee0983d695567497f88f7a746b1c29899a7adef199f2

  • C:\Users\Admin\AppData\Local\Temp\tmpF225.tmp.bat

    Filesize

    184B

    MD5

    40b6112667a94eeaef00d5d4e32e1811

    SHA1

    9e94b9339c6a2ec0bec6623b04e786748613448c

    SHA256

    730fa3a448181e6869b2f9ef3e7d83b61acfe6ebceb239232e21e70cb8447331

    SHA512

    1422de91b49604dca71e1ac8375396a623151662fdb00afeef0714ba723c00fbc658eaba76549b3350ceab01a5d3ee65b4b85f143c181bd37779eeefc1a3f2ef

  • memory/820-130-0x0000000000EE0000-0x0000000000FAE000-memory.dmp

    Filesize

    824KB

  • memory/820-131-0x00007FFBC37E0000-0x00007FFBC42A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1048-139-0x00007FFBC37E0000-0x00007FFBC42A1000-memory.dmp

    Filesize

    10.8MB