Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2022, 20:25

General

  • Target

    c482fad33bb1b2910bd1bbc4c88bb60dcf4e16fca9641bce0d25747d449ee57e.exe

  • Size

    723KB

  • MD5

    a28e6118b19497158bd0f153d61dd4c9

  • SHA1

    fe1f41ed2038be28b1152b9c34295b6b9e16c24e

  • SHA256

    c482fad33bb1b2910bd1bbc4c88bb60dcf4e16fca9641bce0d25747d449ee57e

  • SHA512

    ba502a357756f11cd0fce57b775f686d3a65d6620f0f1c44c3aa7780000481931a148003d0cd25279b8269b4dc3567ce29549047c4523f3eb8e1d8cb45cfa8f1

  • SSDEEP

    768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c482fad33bb1b2910bd1bbc4c88bb60dcf4e16fca9641bce0d25747d449ee57e.exe
    "C:\Users\Admin\AppData\Local\Temp\c482fad33bb1b2910bd1bbc4c88bb60dcf4e16fca9641bce0d25747d449ee57e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:1048
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3544
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1364
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:216
      • C:\ProgramData\Dllhost\dllhost.exe
        "C:\ProgramData\Dllhost\dllhost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1216
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
            PID:2000
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              4⤵
              • Creates scheduled task(s)
              PID:972
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3460
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              4⤵
              • Creates scheduled task(s)
              PID:4216
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              4⤵
              • Creates scheduled task(s)
              PID:3804
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4584
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              4⤵
              • Creates scheduled task(s)
              PID:1348
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
              PID:440
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                4⤵
                • Creates scheduled task(s)
                PID:4532
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              3⤵
                PID:1984
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  4⤵
                  • Creates scheduled task(s)
                  PID:4464
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk448" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                  PID:4340
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk448" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    4⤵
                    • Creates scheduled task(s)
                    PID:2552
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  3⤵
                    PID:1076
                    • C:\Windows\SysWOW64\schtasks.exe
                      SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      4⤵
                      • Creates scheduled task(s)
                      PID:4588
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9883" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    3⤵
                      PID:4572
                      • C:\Windows\SysWOW64\schtasks.exe
                        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9883" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                        4⤵
                        • Creates scheduled task(s)
                        PID:4688
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1881" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      3⤵
                        PID:1652
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9819" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                        3⤵
                          PID:4736
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off
                          3⤵
                            PID:3628
                            • C:\Windows\SysWOW64\chcp.com
                              chcp 1251
                              4⤵
                                PID:2732
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off
                              3⤵
                                PID:3408
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 1251
                                  4⤵
                                    PID:2676
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off
                                  3⤵
                                    PID:392
                                    • C:\Windows\SysWOW64\chcp.com
                                      chcp 1251
                                      4⤵
                                        PID:4168

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\Dllhost\dllhost.exe

                                  Filesize

                                  914KB

                                  MD5

                                  04dba59fdb6289a66f95869ab7fdda04

                                  SHA1

                                  c49fe47659d278f56172dc4cac4e992305d02648

                                  SHA256

                                  5509bcb77f2183f469a17446b84b59ba9f4670d8df3c5534e8b8556ed2e7c05d

                                  SHA512

                                  978f837d6ec40b51377d9faf62b968e46f059b483d3015c787a467fa451c4b4165482f9c30e68ec1200d2e04af94705e178724b848c21cfc31a0ddf0ad7e5682

                                • C:\ProgramData\Dllhost\dllhost.exe

                                  Filesize

                                  914KB

                                  MD5

                                  04dba59fdb6289a66f95869ab7fdda04

                                  SHA1

                                  c49fe47659d278f56172dc4cac4e992305d02648

                                  SHA256

                                  5509bcb77f2183f469a17446b84b59ba9f4670d8df3c5534e8b8556ed2e7c05d

                                  SHA512

                                  978f837d6ec40b51377d9faf62b968e46f059b483d3015c787a467fa451c4b4165482f9c30e68ec1200d2e04af94705e178724b848c21cfc31a0ddf0ad7e5682

                                • C:\ProgramData\HostData\logs.uce

                                  Filesize

                                  497B

                                  MD5

                                  13fda2ab01b83a5130842a5bab3892d3

                                  SHA1

                                  6e18e4b467cde054a63a95d4dfc030f156ecd215

                                  SHA256

                                  76973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e

                                  SHA512

                                  c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  968cb9309758126772781b83adb8a28f

                                  SHA1

                                  8da30e71accf186b2ba11da1797cf67f8f78b47c

                                  SHA256

                                  92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                  SHA512

                                  4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  18KB

                                  MD5

                                  33261ca4d263a0ce28d7c56c372f9d35

                                  SHA1

                                  0efcc7bb6b1e52ae0b456639c2d86a27970866cf

                                  SHA256

                                  678a715918f6a781afc9d1b749954b59449e227cf74a71549b3c4bf0e1c8e6d7

                                  SHA512

                                  bec665450fcd11f8600077e1f7c383aebdff8d823c66c9aea9968d7cdff36663dcd010abb4f5f861dad6d844f25dc70c039be304c14f511361bae981de56e251

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  18KB

                                  MD5

                                  d15aaa4acd0b04256fcb71a4eac85e16

                                  SHA1

                                  1c7c18361f39c783f68c4caecb9e790de055cb53

                                  SHA256

                                  96ae910573445f10ff66802f15015b645095cde6681a74a203691fe7d2c4db0b

                                  SHA512

                                  6e16709fac1bbac393d768762bc8a19a3668903b8c65d90616d87f2732e1e99e317173399683142ea3c72693227171a791eba60f5e7c0d3d9f394f3401db40b8

                                • memory/216-161-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/1364-158-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2132-165-0x00000000001D0000-0x0000000000280000-memory.dmp

                                  Filesize

                                  704KB

                                • memory/3544-143-0x0000000005660000-0x00000000056C6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3544-149-0x0000000007160000-0x000000000717A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3544-150-0x00000000071E0000-0x00000000071EA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3544-141-0x0000000004F50000-0x0000000005578000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/3544-144-0x0000000005E50000-0x0000000005E6E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3544-151-0x0000000007400000-0x0000000007496000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/3544-145-0x0000000006E40000-0x0000000006E72000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/3544-152-0x00000000073A0000-0x00000000073AE000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3544-140-0x00000000048E0000-0x0000000004916000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/3544-146-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3544-147-0x0000000006400000-0x000000000641E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3544-148-0x00000000077E0000-0x0000000007E5A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/3544-153-0x00000000074A0000-0x00000000074BA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/3544-154-0x00000000073E0000-0x00000000073E8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3544-142-0x00000000055C0000-0x00000000055E2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4812-135-0x0000000004F90000-0x0000000004F9A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4812-134-0x0000000004FA0000-0x0000000005032000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/4812-136-0x00000000051F0000-0x0000000005256000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4812-133-0x0000000005470000-0x0000000005A14000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4812-132-0x0000000000530000-0x00000000005D8000-memory.dmp

                                  Filesize

                                  672KB