Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 17:21
Static task
static1
Behavioral task
behavioral1
Sample
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe
Resource
win10v2004-20220722-en
General
-
Target
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe
-
Size
728KB
-
MD5
cf5eaf5016b20b65c805de7e5e074a85
-
SHA1
1b89c182e8421d1b28feec2308cfbb1ce455dd79
-
SHA256
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422
-
SHA512
b3a6cb9d8d686ea1f4ce312ef6f0269cee5fa3df1eb773f672ff2aa2da6c6a0e1b40acedaa8e3fd1fb723304f0e61455886872fb0622368b64cc5a4e98d03158
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Borland8.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Borland8.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4.exe" iexplore.exe -
Executes dropped EXE 2 IoCs
pid Process 5064 Borland8.exe 4556 Borland8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Borland8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4\\A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Borland8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5064 set thread context of 4556 5064 Borland8.exe 85 PID 4556 set thread context of 4928 4556 Borland8.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4556 Borland8.exe 4556 Borland8.exe 4556 Borland8.exe 4556 Borland8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4928 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 5064 Borland8.exe 4556 Borland8.exe 4928 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4772 wrote to memory of 756 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 80 PID 4772 wrote to memory of 756 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 80 PID 4772 wrote to memory of 756 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 80 PID 4772 wrote to memory of 4432 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 82 PID 4772 wrote to memory of 4432 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 82 PID 4772 wrote to memory of 4432 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 82 PID 4772 wrote to memory of 5064 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 84 PID 4772 wrote to memory of 5064 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 84 PID 4772 wrote to memory of 5064 4772 54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe 84 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 5064 wrote to memory of 4556 5064 Borland8.exe 85 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 PID 4556 wrote to memory of 4928 4556 Borland8.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Borland8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe"C:\Users\Admin\AppData\Local\Temp\54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC HOURLY /MO 23 /TN "Forsamlingshusets" /TR "reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "\""Forsamlingshusets"\"" /f /t REG_SZ /d "\""C:\Users\Admin\AppData\Local\Temp\Borland8.exe\""2⤵
- Creates scheduled task(s)
PID:756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /run /tn "Forsamlingshusets"2⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Borland8.exe"C:\Users\Admin\AppData\Local\Temp\Borland8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Borland8.exe"C:\Users\Admin\AppData\Local\Temp\Borland8.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4556 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Borland8.exe4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD5ef41b5d8c942469a54c6bc3d7820f875
SHA1cf3b1e9d07ea0046e0dbb2cc679165ab66bfd45c
SHA2561ae554428c74e230e1b1e89b709630d36cc0e31d42a07c7555e5727809dfe85f
SHA51268b06f59d290acabfbafad73558eb9229cb5f2b4a99723bf7b02e139b60fecec827a2d05c40229d1b63c0cd105fe0581dc282eb71f1f5c53b64b424679cafb7a
-
Filesize
728KB
MD5ef41b5d8c942469a54c6bc3d7820f875
SHA1cf3b1e9d07ea0046e0dbb2cc679165ab66bfd45c
SHA2561ae554428c74e230e1b1e89b709630d36cc0e31d42a07c7555e5727809dfe85f
SHA51268b06f59d290acabfbafad73558eb9229cb5f2b4a99723bf7b02e139b60fecec827a2d05c40229d1b63c0cd105fe0581dc282eb71f1f5c53b64b424679cafb7a
-
Filesize
728KB
MD5ef41b5d8c942469a54c6bc3d7820f875
SHA1cf3b1e9d07ea0046e0dbb2cc679165ab66bfd45c
SHA2561ae554428c74e230e1b1e89b709630d36cc0e31d42a07c7555e5727809dfe85f
SHA51268b06f59d290acabfbafad73558eb9229cb5f2b4a99723bf7b02e139b60fecec827a2d05c40229d1b63c0cd105fe0581dc282eb71f1f5c53b64b424679cafb7a