Analysis

  • max time kernel
    92s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 05:47

General

  • Target

    3.ps1

  • Size

    1.1MB

  • MD5

    2c1d7f30313a38d84667c62442884b8b

  • SHA1

    87a8523c468b51418acdd93ac866c4ffeb038f09

  • SHA256

    5a986b4ea7640b887fbef842e3cf0adcd6aa16482c98ccd6db5a99e726205b3a

  • SHA512

    c12f02092a9f45d3fa51d3a681d10fe6f331439783a18b05db6fc8130f62ef7a8644c84af4c0532693cd43dca9c81b96c12735c2ea7d9e28203f5e2e1c8d0755

  • SSDEEP

    12288:1ViPI6z8ay43NxSz0kmLoL2xfZe0I8nU8ECxKFajz:PINi0kmLF5I8z

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.182.129.168
  • Port:
    21
  • Username:
    ashgdhfg3
  • Password:
    jfghfjgh545

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\JIGIJIGI.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 120 /tn Appligation /F /tr "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"
          4⤵
          • Creates scheduled task(s)
          PID:3100
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 45 /tn ChromiumPluginupdate /F /tr "C:\ProgramData\holatyrimakachola\ChromeExtentionUpdate.vbs"
          4⤵
          • Creates scheduled task(s)
          PID:1440
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\holatyrimakachola\JIGIJIGI.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\holatyrimakachola\GOLGAPORA.PS1
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5104
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
            5⤵
            • Drops file in Drivers directory
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:3112
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3976
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 772
              6⤵
              • Drops file in Windows directory
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:3100
          • C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
            "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4700
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 776
              6⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:5064
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF52D.tmp" "c:\Users\Admin\AppData\Local\Temp\dtynjcae\CSC766261FD1A9A472ABCBEBFED159DCB3E.TMP"
              6⤵
                PID:4844
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.cmdline"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4492
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES119F.tmp" "c:\Users\Admin\AppData\Local\Temp\jfvskaoo\CSCA1DC367875504E6797D67F5D2881861E.TMP"
                6⤵
                  PID:208

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Collection

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B33.tmp.xml
        Filesize

        4KB

        MD5

        6c62665e909e435fe56e13d09de86cc5

        SHA1

        7f7b6d899c3c9bd7da0bf3cbcc610d244b493135

        SHA256

        20f91991ac9bb1a0df9980f4afa727e6a4b762d590981496cd0d0f5d83caa5a2

        SHA512

        b5ede5143849e19b2d4fa9844c07a6ede986749ed7b51bf8d94b02a8292d9486b2c5188533d168a59fd4051e1735b442c81ef37c7b23aa7908be7a4e7fd162c1

      • C:\ProgramData\holatyrimakachola\GOLGAPORA.PS1
        Filesize

        1.1MB

        MD5

        603bffe09d8f6c58499a83212f5febac

        SHA1

        f6616cdfbe8b06b5ee4f95cfee0ed15b74b59466

        SHA256

        d7fe1e3c8d18c2f992dfad7fabfb8f9907786eaca269dbc73593801c7474bd13

        SHA512

        788b7cd546c4557fdbbab8a5048f62838106e592836a9616f19cf82759b6486207912f8787ddf5465a4d5ec4d567776cab701b2c1e5b63980c9245ee51884346

      • C:\ProgramData\holatyrimakachola\JIGIJIGI.bat
        Filesize

        105B

        MD5

        7f53280ea46314479ed1d63b7d9625eb

        SHA1

        9a045c31da18e934b1ca4ce27b72daf0cbbd87fe

        SHA256

        88bc996293478f62bb28814b1787c278a6dc0ed20fe8b11e3f644985b6514459

        SHA512

        275868f4214bc8b874ec857f8938fc35fb77ef025596e1e0cdbea2d231864bec8c4ae09fb557c8dcbe95131c10962cc11744b210f1ec0c111db663fa27a7dbf3

      • C:\ProgramData\holatyrimakachola\JIGIJIGI.vbs
        Filesize

        562B

        MD5

        8ea0ee4f4d6ccbabe4117cdd6f974011

        SHA1

        3271a608993c307046b3185c9a21d434d39fb19c

        SHA256

        cfed6df2d13d6a842032d23d0b12429ca0ddb4ef2bba89f096a05ba44516c620

        SHA512

        5b10ff90b6560956670c85f33266384f4ed401845e137e356ff15e4d613a6a6cc6ff42e68ccde85e0c49d58b7c20f25132ece60a2b60977dd1b3066e59cca61e

      • C:\ProgramData\holatyrimakachola\helloitsindian.vbs
        Filesize

        387B

        MD5

        f0ca1358f7cbc07ffadcdcbb09a8096e

        SHA1

        a1839290fb16f5ccfbcbeec71bcfa4afaa842eaa

        SHA256

        b964c3f6be44ac474f116783e4ca950b909109ff7ea1cf9db9a879a29beeae43

        SHA512

        60fe0ab41793a5fd89a5ffad088a46b0cc8c4db06b8180446e1a4d036c7f81faf35fa726bc9f7b4231b99946ac3c99ae659b4e5a7611e10da2d86344fa620d2c

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
        Filesize

        3KB

        MD5

        223bd4ae02766ddc32e6145fd1a29301

        SHA1

        900cfd6526d7e33fb4039a1cc2790ea049bc2c5b

        SHA256

        1022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e

        SHA512

        648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        1KB

        MD5

        3003448ee73abf14d5c8011a37c40600

        SHA1

        b88e9cdbae2e27a25f0858fc0b6d79533fb160d8

        SHA256

        ae448d99735879ecee1dc3088c8f7553ebff461b96172d8f3cb5ff2fa2a12d4a

        SHA512

        0fe52614eec6d75a265ae380aaa1eb153bc35a1baae4d118637798575169d9dba5ad751efab5d7f5dbe9764bfb96e9ae76577a3487429a3383b5b08d5402fe3a

      • C:\Users\Admin\AppData\Local\Temp\RES119F.tmp
        Filesize

        1KB

        MD5

        34a28d5d3486fec6634fccff0a52c74c

        SHA1

        e15f4dd1be1e0265eface7d1d06a03f0a7f36878

        SHA256

        d3bfab38479f27c4e6b728224c29eaad09e2a4807fe89f3acfc3146ac6961460

        SHA512

        820ad44dd0cca68b12b230e4de19cafce7a5b885355bd9b2c66f25ccf337ba1f971ae5a110c22c354ee72ddc230cb01b4b7e91ec600ae4e187824ac6bc146742

      • C:\Users\Admin\AppData\Local\Temp\RESF52D.tmp
        Filesize

        1KB

        MD5

        c379f68844931986040e99412b5db463

        SHA1

        715a1c9a3019b377171588728a5877f36f15a561

        SHA256

        688d3434b52a4d062c34020f9fa9ba55d15e1f1b0bb30a38c835682f94c82cc6

        SHA512

        7388b72d8237c05fd576e069cb29ebe48ea797da34d3190094d68c2079f466caf81d27ff3351e91cb3e74a50e82668f85807fecc5d59d50136de6df576cbd8ec

      • C:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.dll
        Filesize

        3KB

        MD5

        ed1a6e6a02a12ac7f0cdc4d1549a80ee

        SHA1

        03a7035ca85c3c4520453ac1587f8a2039a57ed1

        SHA256

        dc252df455438dbc54b6f995958c49783986ced36c9a664d9cd1f70a08030324

        SHA512

        3e08f0e14e81dd9dd50228c65167880d843ca6709a4e7c6f0bf0098ed0e89229bdd394179cbb136ed48dfd55c9ea5de39f0587e75189700a3fc17784dd0854f8

      • C:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.dll
        Filesize

        3KB

        MD5

        eab68ae97dcbf4bfc56d9312aee6fcd0

        SHA1

        46580f84218408e44864dd8e74afe09641bbc85d

        SHA256

        7eb98a97fdaed52b52a19175e8a3e2a542fab676ac2265562f9847fd0cdb2153

        SHA512

        ae87763794ce98529d1262529c628e8ab4767da69a5ba909fd9228b5d2584ed8e2a1620907175000c9aab9cc66b2fac0af6ed98844d6473f831efb34ea5702dc

      • \??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\CSC766261FD1A9A472ABCBEBFED159DCB3E.TMP
        Filesize

        652B

        MD5

        1317a917af9688432028228ce663f34e

        SHA1

        32dd454cdc76768da95d261a63b34350fbde4ae7

        SHA256

        8eca461b7f214141c2567ad28d5a49be07f661df0f66b6451c33e7bb8fd9ae76

        SHA512

        d937015c6d721b79a71b9b71a0d1cca1494d418e53c57dc590fb05921a952986e03933910cc2ed1eed2c46a2cb9d164a14c76c05e6a0a6c7220d8835b5e29766

      • \??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.0.cs
        Filesize

        424B

        MD5

        d05db7ca65c16470a87f4c4007e9e026

        SHA1

        ab4a5e6b4fbc331c345d88c39239f003f8dd3da7

        SHA256

        c1412a0d2269b59df9d6b003b2f82f9479040dae4c4e12629db5845a6ac4c960

        SHA512

        825d664f3df2ad4ef8b1e501e6a99aaae7d54db59b9308c34ad3d64b07a6792412beded53919ea8bf9e137f4a7e8aa7ac388a036ab256a1cce201a208ef311cb

      • \??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.cmdline
        Filesize

        369B

        MD5

        a570acba3db4d8bd464d557404ddbf7a

        SHA1

        9f583c7e6cff656729c680911bfd9b96c4795011

        SHA256

        e25ee4125ec4b7da7244175838d52dff42433b20d355ec1753617c7d6c1df49b

        SHA512

        b2ded5975b6c6d8fb3969aa5fd1c11b34e7a9fd1f06e1b64552bf774743b769647ce46f4ae352129a4a27e3a29874b201cec9cc6030072ea7c0c4684e2821a6c

      • \??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\CSCA1DC367875504E6797D67F5D2881861E.TMP
        Filesize

        652B

        MD5

        292b23b4d6cc2e1a16ff379419976ae4

        SHA1

        e150f0f274e37bacba8841f1c10412593d575c66

        SHA256

        c52b4a157984c3b76b6711bcd0acdd275e9288be99476bef8a2e9cfda527c408

        SHA512

        13265a963c2c099de65e9ded46e4d10db6a97a9ff55055f6217abcd0148e3f54e5fc616450c6bc05cbe43bf4d383af31e03015dc358cc3e05997d70bd79f5bd8

      • \??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.0.cs
        Filesize

        424B

        MD5

        5b0a710c68952a280e3737f249a789bb

        SHA1

        cfd4349b3ebe8232b342fa6667e63d8027fcd26b

        SHA256

        32781e50bffd54bf50e075fc3c5fea9bf02030c8aeb34344cf15592d702973ad

        SHA512

        37efadb9ecade74d0f57bf0c5f5ff254203f952a7b54443433dadbc1e720d294ac6e3694a016520b99747a9856dc523d8a901f209285dba53863dd2e3e64e8ad

      • \??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.cmdline
        Filesize

        369B

        MD5

        253e01d7127cebdb70546cf93c3eccc8

        SHA1

        5da29fc0ded140dbde3949461f9b67db98b41edd

        SHA256

        bd7c909eaef450dec6b06a98af68953f85936de65bf71fee97c1a235e66ccd35

        SHA512

        c1871f9c5531f1764420281cad38dfbf5b8e77890fe4c4f3deb3ada30b23355a4e3a90f0daa7320a9cadbe90092aea7ef9e93663dfda29c7c5f01728b62b526c

      • memory/208-178-0x0000000000000000-mapping.dmp
      • memory/556-133-0x00007FF83C100000-0x00007FF83CBC1000-memory.dmp
        Filesize

        10.8MB

      • memory/556-132-0x0000028E31710000-0x0000028E31732000-memory.dmp
        Filesize

        136KB

      • memory/556-136-0x00007FF83C100000-0x00007FF83CBC1000-memory.dmp
        Filesize

        10.8MB

      • memory/1440-142-0x0000000000000000-mapping.dmp
      • memory/2288-134-0x0000000000000000-mapping.dmp
      • memory/2304-168-0x0000000000000000-mapping.dmp
      • memory/3100-156-0x0000000000000000-mapping.dmp
      • memory/3100-141-0x0000000000000000-mapping.dmp
      • memory/3112-157-0x0000000005110000-0x00000000056B4000-memory.dmp
        Filesize

        5.6MB

      • memory/3112-161-0x0000000004B60000-0x0000000004BFC000-memory.dmp
        Filesize

        624KB

      • memory/3112-162-0x0000000004C00000-0x0000000004C92000-memory.dmp
        Filesize

        584KB

      • memory/3112-163-0x0000000004AC0000-0x0000000004B26000-memory.dmp
        Filesize

        408KB

      • memory/3112-150-0x000000000047DA9E-mapping.dmp
      • memory/3112-149-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/3112-166-0x0000000005E70000-0x0000000005EC0000-memory.dmp
        Filesize

        320KB

      • memory/3112-167-0x0000000006700000-0x000000000670A000-memory.dmp
        Filesize

        40KB

      • memory/3976-165-0x0000000074630000-0x0000000074BE1000-memory.dmp
        Filesize

        5.7MB

      • memory/3976-152-0x000000000047DA9E-mapping.dmp
      • memory/3976-158-0x0000000074630000-0x0000000074BE1000-memory.dmp
        Filesize

        5.7MB

      • memory/4492-175-0x0000000000000000-mapping.dmp
      • memory/4700-154-0x000000000047DA9E-mapping.dmp
      • memory/4700-159-0x0000000074630000-0x0000000074BE1000-memory.dmp
        Filesize

        5.7MB

      • memory/4700-164-0x0000000074630000-0x0000000074BE1000-memory.dmp
        Filesize

        5.7MB

      • memory/4824-138-0x0000000000000000-mapping.dmp
      • memory/4844-171-0x0000000000000000-mapping.dmp
      • memory/5012-140-0x0000000000000000-mapping.dmp
      • memory/5064-155-0x0000000000000000-mapping.dmp
      • memory/5104-143-0x0000000000000000-mapping.dmp
      • memory/5104-148-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmp
        Filesize

        10.8MB

      • memory/5104-147-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmp
        Filesize

        10.8MB

      • memory/5104-182-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmp
        Filesize

        10.8MB