Analysis

  • max time kernel
    9s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 11:15

General

  • Target

    f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe

  • Size

    234KB

  • MD5

    6d89acab904ecc3c5bcc43a0f41b82ee

  • SHA1

    5194c510450be6531c9cf05dd467af97383f4ba2

  • SHA256

    f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf

  • SHA512

    8dc854ed9cb78a3c498a358b8ae93fb726c8af99a094e872555561ed3d8739363258884ba1f28b9f9137d0fddb819b28a2a703116424040b9799700a0ef387f9

  • SSDEEP

    6144:2xV8dI3bxRETtXaz/OJepymej5viyT5O/q9DUGEyoSj:2n8dI3b7ETtKKepymejF5aeDUGNoSj

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
    "C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
      "C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:576
    • C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe
      "C:\Users\Admin\AppData\Local\Temp\f122b22900de92988e3fde1ea2a26aebad1d939f749893669e7d64375e52b1bf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe
        "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe
          "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1300
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            5⤵
            • Gathers network information
            PID:1480
        • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe
          "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:624
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\XLPUB.bat" "
            5⤵
              PID:1212
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SkipeTurns" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe" /f
                6⤵
                  PID:1660
            • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe
              "C:\Users\Admin\AppData\Roaming\SkipeTurns.exe"
              4⤵
                PID:1028

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\XLPUB.bat

                Filesize

                142B

                MD5

                7aab82a958be0bdc325ec075c874ca64

                SHA1

                f4ab3d6776f6ffc569a878a003df9a4f0a331eb6

                SHA256

                446e766a1c4c57cf38c3b70b1152a5c1216cc86388fefe5d7d39522458436144

                SHA512

                1737e41a539341737e4fc5c22f13c10b34e5054b2e1b44e604490c4faaf943442c596581fb28b0c967935cfd92c5fd4e7331fb72ae2d4f6ef1b8acc64b46f240

              • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • C:\Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • \Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • \Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • \Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • \Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • \Users\Admin\AppData\Roaming\SkipeTurns.exe

                Filesize

                234KB

                MD5

                42e153780b564f85e1e2e38d9cfc7484

                SHA1

                73bd52dcf6573fe147ea9219163f537cc187c0ad

                SHA256

                8a8a8cfebec0bfb74de5ae0cc4ca699ec8f6b063d29820b21b407fd1a6d31b9b

                SHA512

                52a913715b0b35583b92d23f5ccf388b918ef214bdb59e6745069c168e12cc996d0edb3295a1ba046aae8db78e241e48c40ca82a0ef63c0cd699956c6f55a296

              • memory/576-81-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

                Filesize

                8KB

              • memory/624-127-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/624-135-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/844-57-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-60-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-77-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-56-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-132-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-65-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-67-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/844-59-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/1028-110-0x0000000000400000-0x000000000047B000-memory.dmp

                Filesize

                492KB

              • memory/1028-112-0x0000000000400000-0x000000000047B000-memory.dmp

                Filesize

                492KB

              • memory/1128-76-0x0000000000400000-0x00000000004DF000-memory.dmp

                Filesize

                892KB

              • memory/1236-124-0x0000000000400000-0x00000000004DF000-memory.dmp

                Filesize

                892KB

              • memory/1300-126-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/1300-125-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/1912-123-0x0000000002830000-0x000000000290F000-memory.dmp

                Filesize

                892KB

              • memory/1912-122-0x0000000002830000-0x000000000290F000-memory.dmp

                Filesize

                892KB

              • memory/1912-75-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-74-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-70-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-64-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-69-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-133-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB

              • memory/1912-134-0x0000000002830000-0x000000000290F000-memory.dmp

                Filesize

                892KB

              • memory/1912-63-0x0000000000400000-0x0000000000410000-memory.dmp

                Filesize

                64KB