Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15/06/2022, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe
Resource
win7-20220414-en
General
-
Target
290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe
-
Size
431KB
-
MD5
874070b71835ed9318ddd22f7bf19401
-
SHA1
0f3da757863c2856806f8b2fc2528c6cba991158
-
SHA256
290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743
-
SHA512
b596ec5be90ff0d22f04114831c9f6263df86d25a616c0f5e7449690b387f9207a8f0f0533bee39888fff3ac7c50a5dde31bd393c47f91f9355db3cd9e0118d5
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini RegAsm.exe File opened for modification C:\Windows\assembly\Desktop.ini RegAsm.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly RegAsm.exe File created C:\Windows\assembly\Desktop.ini RegAsm.exe File opened for modification C:\Windows\assembly\Desktop.ini RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3480 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe Token: SeDebugPrivilege 3480 RegAsm.exe Token: 33 3480 RegAsm.exe Token: SeIncBasePriorityPrivilege 3480 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3480 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4980 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 91 PID 4808 wrote to memory of 4980 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 91 PID 4808 wrote to memory of 4980 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 91 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93 PID 4808 wrote to memory of 3480 4808 290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe"C:\Users\Admin\AppData\Local\Temp\290906f49b5ee43d584cd47d44d8cc86662ba975494049d0f518fe3fcf9fd743.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CipuKk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D76.tmp"2⤵
- Creates scheduled task(s)
PID:4980
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e81dcc6abe0857365710fb75065bb03
SHA17a68fe408d282eaca6adab3e3062518beefb7938
SHA2567028cd739a151edb9e8dbd2d55cf036f2dd5df1a6e16f812915cf0570f34e38b
SHA5128d7d26508a24ee6ccaae1402c25b4b5c93794e425ad20efbd410040881364a6c7033bdb1f17964d137f3bba32a494164f44ceaf4fa3519249f9943258f11ac95