Analysis

  • max time kernel
    69s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2022 20:46

General

  • Target

    d3c0a965821c6b1a088500094b81ebc6c34dd9af95ed7c14318ee102e5713b79.exe

  • Size

    5.7MB

  • MD5

    48f8b740502412cccc79cecdbf7f4064

  • SHA1

    9e8d1e5a67781ec6ba27822063009057a63c5cf0

  • SHA256

    d3c0a965821c6b1a088500094b81ebc6c34dd9af95ed7c14318ee102e5713b79

  • SHA512

    9e97f7ec44f04ed3412fc51f0e0a3c70f0c9c00766f82a9212c407fb40a111ae5920c0e3dabcf416ae93963a5f5784d57ae5596216cd4c646d51112aff01fdb3

  • SSDEEP

    98304:rufaRACOnSgipE1UZQaYNeX6GcSLAzINGhDiL4j92JKAWl0PMbGfo3acSGoh:KUY2QmlYAXYSLzNuDisj92UAWl+gGiad

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3c0a965821c6b1a088500094b81ebc6c34dd9af95ed7c14318ee102e5713b79.exe
    "C:\Users\Admin\AppData\Local\Temp\d3c0a965821c6b1a088500094b81ebc6c34dd9af95ed7c14318ee102e5713b79.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\ver.exe
      C:\Users\Admin\AppData\Local\Temp\ver.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\3FFE.tmp\3FFF.tmp\4000.bat C:\Users\Admin\AppData\Local\Temp\ver.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im openvpn.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1904
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im openvpn-gui.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im cstrike-online.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1920
        • C:\Windows\regedit.exe
          regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\OpenVPN\reg\HKLM\*.reg"
          4⤵
          • Runs .reg file with regedit
          PID:1972
        • C:\Windows\regedit.exe
          regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\OpenVPN\reg\HKCU\*.reg"
          4⤵
          • Runs .reg file with regedit
          PID:1084
        • C:\Windows\system32\reg.exe
          reg add "HKCU\SOFTWARE\OpenVPN-GUI" /v config_dir /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\config" /f
          4⤵
            PID:1408
          • C:\Windows\system32\reg.exe
            reg add "HKLM\SOFTWARE\OpenVPN-GUI" /v exe_path /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\bin\openvpn.exe" /f
            4⤵
              PID:1120
            • C:\Windows\system32\reg.exe
              reg add "HKLM\SOFTWARE\OpenVPN-GUI" /v config_dir /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\config" /f
              4⤵
                PID:1948
              • C:\Windows\system32\reg.exe
                reg add "HKLM\SOFTWARE\OpenVPN-GUI" /v log_dir /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\log" /f
                4⤵
                  PID:1072
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\SOFTWARE\OpenVPN" /v exe_path /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\bin\openvpn.exe" /f
                  4⤵
                    PID:1388
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\SOFTWARE\OpenVPN" /v config_dir /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\config" /f
                    4⤵
                      PID:1592
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\SOFTWARE\OpenVPN" /v log_dir /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN\log" /f
                      4⤵
                        PID:1704
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\SOFTWARE\OpenVPN" /ve /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OpenVPN" /f
                        4⤵
                          PID:1928
                        • C:\Windows\system32\reg.exe
                          REG ADD "HKEY_CURRENT_USER\Software\Nexon\CStrike-Online\Settings" /V EngineD3D /T REG_DWORD /D 0 /F
                          4⤵
                            PID:1212
                          • C:\Windows\system32\netsh.exe
                            NetSh Advfirewall set allprofiles state off
                            4⤵
                            • Modifies Windows Firewall
                            PID:836

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\3FFE.tmp\3FFF.tmp\4000.bat

                      Filesize

                      1KB

                      MD5

                      38711e5bd4bb651014ceabadf817ac8b

                      SHA1

                      3da32daf684e261fe228cfc2ed4470e26ea8c891

                      SHA256

                      c6adb8338163a42c0c32f98f86617eade59641f8ad99ed6a07d9264330611e41

                      SHA512

                      633180c2aad2787467c20a237be9fa8c62c1e1c686ac80e8ec323997b16b29b69e6f674469937d53ef9512350a37abb725aa6bae9823babd0eb125d0eb9f7142

                    • C:\Users\Admin\AppData\Local\Temp\ver.exe

                      Filesize

                      113KB

                      MD5

                      717448338d945a169c78b051d7ecb397

                      SHA1

                      dc924a97785d3be9d85d205a054650bc17840ecf

                      SHA256

                      d394ffe8b88174635f30ff2d9cd34a53c038e47ff208945cf0abd99518555ea8

                      SHA512

                      7b814a33485b7aa426eb2957ba01812a9bd297223d6fead99f65b77e5e185e75a54e60de9018823dc62e55279fbad658c14b980b2bb827d86549b214fba62057

                    • \Users\Admin\AppData\Local\Temp\ver.exe

                      Filesize

                      113KB

                      MD5

                      717448338d945a169c78b051d7ecb397

                      SHA1

                      dc924a97785d3be9d85d205a054650bc17840ecf

                      SHA256

                      d394ffe8b88174635f30ff2d9cd34a53c038e47ff208945cf0abd99518555ea8

                      SHA512

                      7b814a33485b7aa426eb2957ba01812a9bd297223d6fead99f65b77e5e185e75a54e60de9018823dc62e55279fbad658c14b980b2bb827d86549b214fba62057

                    • memory/1972-66-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp

                      Filesize

                      8KB

                    • memory/2028-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

                      Filesize

                      8KB