Analysis

  • max time kernel
    131s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 11:48

General

  • Target

    2bebc7405d49af80ac733369da4bc71721d8550c073fec794854bf919285a5e5.exe

  • Size

    1.3MB

  • MD5

    61c1f8e519d390e7e4b731804cbaca47

  • SHA1

    fd500c0acc980eeecb47203684c3c4a8199e892d

  • SHA256

    2bebc7405d49af80ac733369da4bc71721d8550c073fec794854bf919285a5e5

  • SHA512

    63796bcd86ad032ff6da9d717705238248d09d4280a69233589eafceb973e530d9ebb3a751a05747505d199921a26647931e0e45ad99fe5db53fc9ec8a601ae8

  • SSDEEP

    24576:xVuym5nZuGHbGsWOrJjC8TEUa9kHtZLzjjiPD/SuJmlCduoLpJHcSiN5p:Nm5WOrJu8paeHLvjjiPbShAd5VJ8Siv

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bebc7405d49af80ac733369da4bc71721d8550c073fec794854bf919285a5e5.exe
    "C:\Users\Admin\AppData\Local\Temp\2bebc7405d49af80ac733369da4bc71721d8550c073fec794854bf919285a5e5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\spcdriver.exe
        C:\Users\Admin\AppData\Local\Temp\spcdriver.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C at 18:40 /every:M,T,W,Th,F,Sa,Su ""C:\windows\skp.exe""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\SysWOW64\at.exe
            at 18:40 /every:M,T,W,Th,F,Sa,Su ""C:\windows\skp.exe""
            5⤵
              PID:1200
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C at 18:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dcx.exe""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1812
            • C:\Windows\SysWOW64\at.exe
              at 18:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dcx.exe""
              5⤵
                PID:1224
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C at 18:50 /every:M,T,W,Th,F,Sa,Su ""c:\windows\ksp.exe""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1504
              • C:\Windows\SysWOW64\at.exe
                at 18:50 /every:M,T,W,Th,F,Sa,Su ""c:\windows\ksp.exe""
                5⤵
                  PID:956
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /C at 18:55 /every:M,T,W,Th,F,Sa,Su ""c:\windows\sxc.exe""
                4⤵
                  PID:1576
                  • C:\Windows\SysWOW64\at.exe
                    at 18:55 /every:M,T,W,Th,F,Sa,Su ""c:\windows\sxc.exe""
                    5⤵
                      PID:1760
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /C at 19:00 /every:M,T,W,Th,F,Sa,Su ""c:\windows\chp.exe""
                    4⤵
                      PID:1920
                      • C:\Windows\SysWOW64\at.exe
                        at 19:00 /every:M,T,W,Th,F,Sa,Su ""c:\windows\chp.exe""
                        5⤵
                          PID:1068
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE
                    2⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Enumerates connected drives
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1012
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -dli"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:884
                      • C:\Windows\System32\cscript.exe
                        C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -dli
                        4⤵
                          PID:564

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE

                    Filesize

                    2.2MB

                    MD5

                    c0c0f1c63558da811f2668cbccee6f48

                    SHA1

                    f8c2daf411eac1e5d2a2f2680f1bfc17d1ad488a

                    SHA256

                    93f24e4ff9d6c95205f673b93cb1d2ace05c06502496de2140b0fd2fa9e08ab5

                    SHA512

                    a4d5396e743806b2150299d42b44f04d9297c96c83a87bf5ca439120ee544808f1fb0181098f9141b15f27c6c3b6619e251f841621bfe1726429099fdb2a65df

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE

                    Filesize

                    2.2MB

                    MD5

                    c0c0f1c63558da811f2668cbccee6f48

                    SHA1

                    f8c2daf411eac1e5d2a2f2680f1bfc17d1ad488a

                    SHA256

                    93f24e4ff9d6c95205f673b93cb1d2ace05c06502496de2140b0fd2fa9e08ab5

                    SHA512

                    a4d5396e743806b2150299d42b44f04d9297c96c83a87bf5ca439120ee544808f1fb0181098f9141b15f27c6c3b6619e251f841621bfe1726429099fdb2a65df

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe

                    Filesize

                    209KB

                    MD5

                    36a114961d8a09c3942a9d5282edba16

                    SHA1

                    b1448af98aa761db377a3ffe10feaca7c2c96cac

                    SHA256

                    1b09e7528553d3e7ff1e38f304b551dea1bc916253f2baca88d5df7da68d8a86

                    SHA512

                    5cf803648d233e736d280a5149d06d8e4a02f8ac16fe7142778f1043d832dad30dd468f0a7a1db9bd4aa3fa055ae1164a413c9949d61d23ba5e67441fa98f258

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe

                    Filesize

                    209KB

                    MD5

                    36a114961d8a09c3942a9d5282edba16

                    SHA1

                    b1448af98aa761db377a3ffe10feaca7c2c96cac

                    SHA256

                    1b09e7528553d3e7ff1e38f304b551dea1bc916253f2baca88d5df7da68d8a86

                    SHA512

                    5cf803648d233e736d280a5149d06d8e4a02f8ac16fe7142778f1043d832dad30dd468f0a7a1db9bd4aa3fa055ae1164a413c9949d61d23ba5e67441fa98f258

                  • C:\Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • C:\Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe

                    Filesize

                    209KB

                    MD5

                    36a114961d8a09c3942a9d5282edba16

                    SHA1

                    b1448af98aa761db377a3ffe10feaca7c2c96cac

                    SHA256

                    1b09e7528553d3e7ff1e38f304b551dea1bc916253f2baca88d5df7da68d8a86

                    SHA512

                    5cf803648d233e736d280a5149d06d8e4a02f8ac16fe7142778f1043d832dad30dd468f0a7a1db9bd4aa3fa055ae1164a413c9949d61d23ba5e67441fa98f258

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe

                    Filesize

                    209KB

                    MD5

                    36a114961d8a09c3942a9d5282edba16

                    SHA1

                    b1448af98aa761db377a3ffe10feaca7c2c96cac

                    SHA256

                    1b09e7528553d3e7ff1e38f304b551dea1bc916253f2baca88d5df7da68d8a86

                    SHA512

                    5cf803648d233e736d280a5149d06d8e4a02f8ac16fe7142778f1043d832dad30dd468f0a7a1db9bd4aa3fa055ae1164a413c9949d61d23ba5e67441fa98f258

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\qz-setup.exe

                    Filesize

                    209KB

                    MD5

                    36a114961d8a09c3942a9d5282edba16

                    SHA1

                    b1448af98aa761db377a3ffe10feaca7c2c96cac

                    SHA256

                    1b09e7528553d3e7ff1e38f304b551dea1bc916253f2baca88d5df7da68d8a86

                    SHA512

                    5cf803648d233e736d280a5149d06d8e4a02f8ac16fe7142778f1043d832dad30dd468f0a7a1db9bd4aa3fa055ae1164a413c9949d61d23ba5e67441fa98f258

                  • \Users\Admin\AppData\Local\Temp\nse341E.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • \Users\Admin\AppData\Local\Temp\nse341E.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • \Users\Admin\AppData\Local\Temp\nse341E.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • \Users\Admin\AppData\Local\Temp\nse341E.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • \Users\Admin\AppData\Local\Temp\nse341E.tmp\nsExec.dll

                    Filesize

                    6KB

                    MD5

                    acc2b699edfea5bf5aae45aba3a41e96

                    SHA1

                    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                    SHA256

                    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                    SHA512

                    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                  • \Users\Admin\AppData\Local\Temp\nsj9F3F.tmp\inetc.dll

                    Filesize

                    20KB

                    MD5

                    50fdadda3e993688401f6f1108fabdb4

                    SHA1

                    04a9ae55d0fb726be49809582cea41d75bf22a9a

                    SHA256

                    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

                    SHA512

                    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

                  • \Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • \Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • \Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • \Users\Admin\AppData\Local\Temp\spcdriver.exe

                    Filesize

                    105KB

                    MD5

                    a769b390196927f539a48a65289c2953

                    SHA1

                    a7e7c3c84e5d5f0c5c7c640226c7c1ca9c5a24e9

                    SHA256

                    f22eb8449740529f790536aa5fc4890963acbdd68ae3601a717f4e11881b24bb

                    SHA512

                    b97712697d09993c594fb3dd810a93c2f8e9fa3f1a7d932f7d2fdc6e9053a25edca85018eeaeba78255a5a9a8e4bf62d7428e756a19d649c0feedb8f1b448872

                  • memory/1012-115-0x0000000000400000-0x0000000000623000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/1012-76-0x0000000010000000-0x0000000010021000-memory.dmp

                    Filesize

                    132KB

                  • memory/1012-93-0x0000000000360000-0x0000000000370000-memory.dmp

                    Filesize

                    64KB

                  • memory/1012-84-0x0000000000340000-0x0000000000351000-memory.dmp

                    Filesize

                    68KB

                  • memory/1012-116-0x0000000002390000-0x0000000002461000-memory.dmp

                    Filesize

                    836KB

                  • memory/1012-137-0x0000000000400000-0x0000000000623000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/1012-101-0x0000000000380000-0x0000000000390000-memory.dmp

                    Filesize

                    64KB

                  • memory/1092-54-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1608-57-0x0000000075201000-0x0000000075203000-memory.dmp

                    Filesize

                    8KB