Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 10:38
Static task
static1
Behavioral task
behavioral1
Sample
Specification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Specification.exe
Resource
win10v2004-20220414-en
General
-
Target
Specification.exe
-
Size
717KB
-
MD5
20796a16b1839afba1f87ed53e7bd841
-
SHA1
d5bd0d0efc2059dbbf1eaaa30b1c859c313d9250
-
SHA256
2d0474bfb8aced6c0aacc081936209dc9287827e20284160ceae3edca8a50184
-
SHA512
ad809362c428bdd0d30f56e4fe8f4bfd7960849575451b33c642d5fc7d424e7eb355ec3caba95f02040a80d505db4f04edf363dd7dbdbe79df94ccb22dbce09f
Malware Config
Signatures
-
Processes:
InstallUtil.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" InstallUtil.exe -
Processes:
InstallUtil.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" InstallUtil.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Specification.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Specification.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Specification.exeiexplore.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ftirj = "\"C:\\Users\\Admin\\AppData\\Roaming\\Vcwewugzx\\Ftirj.exe\"" Specification.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Specification.exeInstallUtil.exedescription pid Process procid_target PID 4908 set thread context of 3644 4908 Specification.exe 91 PID 3644 set thread context of 3584 3644 InstallUtil.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
powershell.exeSpecification.exeInstallUtil.exepid Process 740 powershell.exe 740 powershell.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 4908 Specification.exe 3644 InstallUtil.exe 3644 InstallUtil.exe 3644 InstallUtil.exe 3644 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Specification.exepowershell.exeiexplore.exedescription pid Process Token: SeDebugPrivilege 4908 Specification.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 3584 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exeiexplore.exepid Process 3644 InstallUtil.exe 3584 iexplore.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Specification.exeInstallUtil.exedescription pid Process procid_target PID 4908 wrote to memory of 740 4908 Specification.exe 80 PID 4908 wrote to memory of 740 4908 Specification.exe 80 PID 4908 wrote to memory of 740 4908 Specification.exe 80 PID 4908 wrote to memory of 4980 4908 Specification.exe 89 PID 4908 wrote to memory of 4980 4908 Specification.exe 89 PID 4908 wrote to memory of 4980 4908 Specification.exe 89 PID 4908 wrote to memory of 4668 4908 Specification.exe 90 PID 4908 wrote to memory of 4668 4908 Specification.exe 90 PID 4908 wrote to memory of 4668 4908 Specification.exe 90 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 4908 wrote to memory of 3644 4908 Specification.exe 91 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92 PID 3644 wrote to memory of 3584 3644 InstallUtil.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specification.exe"C:\Users\Admin\AppData\Local\Temp\Specification.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- UAC bypass
- Windows security bypass
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3584
-
-