Analysis

  • max time kernel
    152s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 08:36

General

  • Target

    795843135acf3bfc1bd66343fa70ee4ea742574f587ceaa6f3b1635378b7de43.exe

  • Size

    849KB

  • MD5

    800ac4377c37a50a6158a5ed2b6d0b30

  • SHA1

    2dc8ef58f33cf6125a63dea11ad3909fc01dc7ce

  • SHA256

    795843135acf3bfc1bd66343fa70ee4ea742574f587ceaa6f3b1635378b7de43

  • SHA512

    a013a33852f344ea56c36dadecff0cb70dab9e3a12fc9d80b42d3e411db486d21316f96f6ed4eed81a30e2fd45a7af637ca7f0fac119c6bf0c99a8bf4ad614b5

  • SSDEEP

    12288:BXsLwqObLSRYSHYVrNCXtw7N5B2X8NT6/a9xY0qH9wZ2la2:5OwqOkYS4RNFhN6iQ0oE2

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\795843135acf3bfc1bd66343fa70ee4ea742574f587ceaa6f3b1635378b7de43.exe
    "C:\Users\Admin\AppData\Local\Temp\795843135acf3bfc1bd66343fa70ee4ea742574f587ceaa6f3b1635378b7de43.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 720
      2⤵
      • Program crash
      PID:3872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 720
      2⤵
      • Program crash
      PID:3560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1236
      2⤵
      • Program crash
      PID:3284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1240
      2⤵
      • Program crash
      PID:3836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1380
      2⤵
      • Program crash
      PID:4220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1388
      2⤵
      • Program crash
      PID:364
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1412
      2⤵
      • Program crash
      PID:4944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1412
      2⤵
      • Program crash
      PID:2364
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1476
      2⤵
      • Program crash
      PID:2016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1812
      2⤵
      • Program crash
      PID:4648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4752 -ip 4752
    1⤵
      PID:2444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4752 -ip 4752
      1⤵
        PID:5072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4752 -ip 4752
        1⤵
          PID:4936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4752 -ip 4752
          1⤵
            PID:4436
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4752 -ip 4752
            1⤵
              PID:3620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4752 -ip 4752
              1⤵
                PID:3240
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4752 -ip 4752
                1⤵
                  PID:3776
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4752 -ip 4752
                  1⤵
                    PID:4020
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4752 -ip 4752
                    1⤵
                      PID:4112
                    • C:\Windows\system32\sihost.exe
                      sihost.exe
                      1⤵
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of WriteProcessMemory
                      PID:4920
                      • C:\Windows\explorer.exe
                        explorer.exe /LOADSAVEDWINDOWS
                        2⤵
                        • Modifies Installed Components in the registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:4364
                        • C:\Windows\system32\WerFault.exe
                          C:\Windows\system32\WerFault.exe -u -p 4364 -s 2256
                          3⤵
                          • Program crash
                          PID:4320
                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                      1⤵
                      • Modifies data under HKEY_USERS
                      • Suspicious use of SetWindowsHookEx
                      PID:936
                    • C:\Windows\system32\sihost.exe
                      sihost.exe
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4476
                      • C:\Windows\explorer.exe
                        explorer.exe /LOADSAVEDWINDOWS
                        2⤵
                          PID:4744
                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                        1⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious use of SetWindowsHookEx
                        PID:4236
                      • C:\Windows\system32\WerFault.exe
                        C:\Windows\system32\WerFault.exe -pss -s 516 -p 4364 -ip 4364
                        1⤵
                          PID:2008
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          1⤵
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of WriteProcessMemory
                          PID:2408
                          • C:\Windows\explorer.exe
                            explorer.exe /LOADSAVEDWINDOWS
                            2⤵
                            • Modifies registry class
                            PID:1472
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                          • Modifies Installed Components in the registry
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:5000
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 5000 -s 2240
                            2⤵
                            • Program crash
                            PID:4696
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
                          1⤵
                          • Enumerates connected drives
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SetWindowsHookEx
                          PID:4792
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                          1⤵
                            PID:312
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -pss -s 532 -p 5000 -ip 5000
                            1⤵
                              PID:4532
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              1⤵
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of WriteProcessMemory
                              PID:3776
                              • C:\Windows\explorer.exe
                                explorer.exe /LOADSAVEDWINDOWS
                                2⤵
                                • Modifies registry class
                                PID:3532
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
                              1⤵
                                PID:4944
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                • Modifies Installed Components in the registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:4060
                                • C:\Windows\system32\WerFault.exe
                                  C:\Windows\system32\WerFault.exe -u -p 4060 -s 2620
                                  2⤵
                                  • Program crash
                                  PID:4340
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -pss -s 508 -p 4060 -ip 4060
                                1⤵
                                  PID:2884
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  1⤵
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:3856
                                  • C:\Windows\explorer.exe
                                    explorer.exe /LOADSAVEDWINDOWS
                                    2⤵
                                      PID:1172
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                    • Modifies Installed Components in the registry
                                    • Enumerates connected drives
                                    • Checks SCSI registry key(s)
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:3084
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of WriteProcessMemory
                                    PID:3792
                                    • C:\Windows\explorer.exe
                                      explorer.exe /LOADSAVEDWINDOWS
                                      2⤵
                                      • Modifies Installed Components in the registry
                                      • Enumerates connected drives
                                      • Checks SCSI registry key(s)
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5052
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4752 -ip 4752
                                    1⤵
                                      PID:3460
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3184
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                      • Enumerates system info in registry
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1860

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                      Filesize

                                      1KB

                                      MD5

                                      ada005cb872020ba515454520e9761ed

                                      SHA1

                                      55f98694e7c9de552b51784139315cdaeb772878

                                      SHA256

                                      187e6e496b3f898d8bae316428e2b402af5c13c85a9c99fc6ea63237ddd245e2

                                      SHA512

                                      3216f0b7e06e7d55c0d51ab1eaf5dc34c7816d5e934032ea46f7390a745fda1d461a6369feb54c73fd037e0c7b7a63b8ab07cd75efc6b8c44a35b6d9aae4a555

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                      Filesize

                                      434B

                                      MD5

                                      fb3ef330fbb2796e92561a5b3c40aefd

                                      SHA1

                                      4b955fc38504a0815dd929c1ed080a213bfeab45

                                      SHA256

                                      43aebbdffcb022b0e7c53ba152e13dab3cf31eed2bc91ea26425d0620ad90a70

                                      SHA512

                                      55fbfe8ec66e68721509f85a8a391d73264890978714e1e8880428da7e0c32e98a585838caf4509f6718eaaac7cc86156a0afccdbdaea28c64ba7286c2ea38d0

                                    • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat

                                      Filesize

                                      1022B

                                      MD5

                                      fef887ef25b166c4556b08e8658fe640

                                      SHA1

                                      5eece3c7574417577a5c062ed61d933313be1ead

                                      SHA256

                                      28acc8fc796133f63814d940128356328c7dcff693913b672f1c3ebe9989c90f

                                      SHA512

                                      a87a642359c3961ed0ecb2db378a6ca62da6bda412fdf3bc69f645fde4cf7d518ec29c3cb3f352526a227a5d04cbc077817f80e23ea3a5aa65b75e87e6fb52d4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                      Filesize

                                      28KB

                                      MD5

                                      19033f534b892bb0aeb19ee93d4ce0de

                                      SHA1

                                      f865fabb5e92165246ccb955745ad6a6fa3b3dde

                                      SHA256

                                      e2e2ed6f0fbff7094a775548a5d35a69631b019aedbd48943d5c5d7739e30872

                                      SHA512

                                      2582359a149862278db3f7bc4d0938a8495e0d48e0782af219ff78200bc8d86b6d792df159646aff294a982a22dec745cb7354dd59dec7ca4287bff7d4ffb0c9

                                    • memory/1860-154-0x000002956FD50000-0x000002956FD70000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1860-158-0x0000029570B50000-0x0000029570B70000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1860-156-0x0000029570840000-0x0000029570860000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1860-155-0x00000295700E8000-0x00000295700F0000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/4752-132-0x0000000000400000-0x0000000000A1B000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/4752-133-0x0000000000400000-0x0000000000A1B000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/4752-135-0x0000000000400000-0x0000000000A1B000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/4752-136-0x0000000000400000-0x0000000000A1B000-memory.dmp

                                      Filesize

                                      6.1MB