Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-05-2022 14:29

General

  • Target

    be75e9e51767b5a59536afbbf9ffafbc.exe

  • Size

    810KB

  • MD5

    be75e9e51767b5a59536afbbf9ffafbc

  • SHA1

    78be65d86a6918643092e8e90fd72ad3b9ab997f

  • SHA256

    30a4788b9d7eb3c50403737f4af3882b79ba75b8201d53aefb359336f5763745

  • SHA512

    4e9f7198dd12adeb21669f74e1cdebe16ac7ccae8e1f29b537438239d1a240a8f1ab890afebe8c1f8603909a1c72b8ce7e7c981f2147fa53dccc6c43b6a3d9e6

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe
    "C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /tn HGRAyZk0Y950ZeEUrPGcT36so /tr "C:\ProgramData\test\test.exe" /st 16:34 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:4844
    • C:\ProgramData\test\test.exe
      "C:\ProgramData\test\test.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      PID:3176
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp89B.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\system32\timeout.exe
        timeout 6
        3⤵
        • Delays execution with timeout.exe
        PID:3164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\test\test.exe

    Filesize

    645.3MB

    MD5

    56a5ed2808c07a1745f1e0dba01df57e

    SHA1

    ea63ab0954a8f27aeae4182fc610979801c501ce

    SHA256

    a04fe955b0a0ade366323d5b65eec807c8a43f22f8fdd58cc0bcf1cfaff2e7c0

    SHA512

    b3a5f66bf03373a162306d3d0e5d925182b2bc2f7e889a5d15b3c698d5f4a696270c44da00508e9688321e2bd75f640fe4e114021e1c2a835e7c1fc992414316

  • C:\ProgramData\test\test.exe

    Filesize

    645.3MB

    MD5

    56a5ed2808c07a1745f1e0dba01df57e

    SHA1

    ea63ab0954a8f27aeae4182fc610979801c501ce

    SHA256

    a04fe955b0a0ade366323d5b65eec807c8a43f22f8fdd58cc0bcf1cfaff2e7c0

    SHA512

    b3a5f66bf03373a162306d3d0e5d925182b2bc2f7e889a5d15b3c698d5f4a696270c44da00508e9688321e2bd75f640fe4e114021e1c2a835e7c1fc992414316

  • C:\Users\Admin\AppData\Local\Temp\tmp89B.tmp.bat

    Filesize

    183B

    MD5

    5a3183eb8f56bdd3fd45e3fa6e20e859

    SHA1

    67af19f1c46d516b8a19d1c3650ba6dec4498bea

    SHA256

    8f5a7f4a436b3146aa1007d38f75f522833a00418af80f17042ecbeac0d900c7

    SHA512

    ae63fa2dbf341a13bdd0b0bc8d6512895c9ce4752d61678b9e6b2480ce86d66a2b1a3bdf30be06a59f842490caf7c14a3a78de6fa2d9325a4cba68c43137121a

  • memory/3112-130-0x00000000005F0000-0x00000000006BE000-memory.dmp

    Filesize

    824KB

  • memory/3112-131-0x00007FFB62E30000-0x00007FFB638F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3176-139-0x00007FFB62E30000-0x00007FFB638F1000-memory.dmp

    Filesize

    10.8MB