Analysis

  • max time kernel
    192s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 19:18

General

  • Target

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe

  • Size

    312KB

  • MD5

    4588d6515198e39f1b4f42d3873650a0

  • SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

  • SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

  • SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • SSDEEP

    6144:wRDQklQdJvUq2S9x9bXlw0x4RtLcjXHt7FBaNrWMarMWkwHEo:wRDQklQdJvUhShXS00LcjHthKK1rRao

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe
    "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe
      "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Looks for VirtualBox Guest Additions in registry
      • Adds policy Run key to start application
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Drops startup file
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Control Panel
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3708
      • C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe" "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe" "C:\Users\Admin\AppData\Local\Temp\ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5.exe"
          4⤵
          • Executes dropped EXE
          PID:1828
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping 127.0.0.1 >> nul
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          PID:4936
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:3804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.bin\S-1-5-21-2295526160-1155304984-640977766-1000\$ast-S-1-5-21-2295526160-1155304984-640977766-1000\Gl9_4mU9KT34NoCzfjki_f.dat

    Filesize

    423B

    MD5

    6d0794e1ad68132b2ab6c9a46ac39d18

    SHA1

    74214bdb7536fb427675606c578b2c08812d7031

    SHA256

    a077ba82cfd102b4b921540f18bf2ea23897472fe17cfe4d2d12ac7661c90062

    SHA512

    23f5e1b99daf801ca9f54a7d139bc1f55d5f14d9d88275fb796d26c5a8d9931a3ef06b6765130d91aed0a4fa5b51bc2106e58e2616086e2c3ae7f7f51f9c7cf9

  • C:\$Recycle.bin\S-1-5-21-2295526160-1155304984-640977766-1000\$ast-S-1-5-21-2295526160-1155304984-640977766-1000\QwB1CV81RNhq1hRPI.dat

    Filesize

    131KB

    MD5

    7a4f59c42cfe2fbecfc10f3259d4209a

    SHA1

    072625f3f93d1ca14cf536e9fd035ec227f6216e

    SHA256

    8bdfbb204b9f106913dd69c743fe3a798d45138c65a05a2ad4e65c37e43c967b

    SHA512

    e48f093529520bfeffc7db065512519ec83b77be2ed7c911f38230de0bda1424ec8c9a0d662bb20a72d9566e5906bc1b06f308b4f36065ae73c1de2bdb392dea

  • C:\$Recycle.bin\S-1-5-21-2295526160-1155304984-640977766-1000\$ast-S-1-5-21-2295526160-1155304984-640977766-1000\YEiGqlWUzu8OebWSLDIQf2.dat

    Filesize

    5KB

    MD5

    5884e04f5ac2bd0656ea4dd049820a14

    SHA1

    5b8e76418925af7770fa798ad0574ad8c6f18f8a

    SHA256

    3656c7af2382a38aeccb1e814394ce94ea2dfc9e45f79477b143a587ceee20e8

    SHA512

    6d14ec06c0055640908a9d89d52354a67d3848e06c114b68519a52d3549126af54badabeac913901fab77a1a93d7f5b5ef9237f23c223804db4d83135c8fd5cf

  • C:\$Recycle.bin\S-1-5-21-2295526160-1155304984-640977766-1000\$ast-S-1-5-21-2295526160-1155304984-640977766-1000\_b-suh4QHirsy5K2gH851w1g8tw.dat

    Filesize

    463B

    MD5

    0b429c45b4f35b04f1f875b8564051d1

    SHA1

    4f4b717c1656185089c2c2510f87e4caf4cd7e2e

    SHA256

    498b10cbbb22e88c31a125821269cf698f27bf29a953997499170689ab51edbe

    SHA512

    5700c28db9c987148fc48d540fd5db6ee02aa2d3bdbff559b0cbe92e9b7255a338710cc3fb258d068cfbf70b482cb9a476bf4dbb982416dedd77cec131ff4142

  • C:\$Recycle.bin\S-1-5-21-2295526160-1155304984-640977766-1000\$ast-S-1-5-21-2295526160-1155304984-640977766-1000\oAHRZmD6famMMI6D.dat

    Filesize

    21KB

    MD5

    cea0778e168a2748de2550b29abc9984

    SHA1

    169b20226fc5ce25062373b2d9ede62970924f51

    SHA256

    80f30efe1aa1dfb82f908ad16e8121fec6d5c7e81c7ec40855bb673b47cabc47

    SHA512

    0efd0457a3b9c6f05d0d1c7d3eabc548a20dbd58447cd1292364ba194ec6dfd0d1ee2dcb819787b836f7e8493fcc58b7de495700c6fbfbfe81ceee14ba77e022

  • C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Local\Temp\tmpFDB9.exe

    Filesize

    312KB

    MD5

    4588d6515198e39f1b4f42d3873650a0

    SHA1

    bc9be43667c91ab79cbd6ed75b572602f95c90c1

    SHA256

    ec589dcb72e74209d47a1f6ed8e9a1e16250851df9c06c8b9b196499edf01cf5

    SHA512

    b7580f60785ce34981657d1a2ffe1a36a34b34b88c225c5fee35ae5841024b6c2194945553c0365819ee8b704251ea7ec375f2944549133e1de61f6f3b707cb3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\WPDShextAutoplay.exe

    Filesize

    131KB

    MD5

    c7c87bb8f881c9b1989c94bd17b0dc61

    SHA1

    e26c77ee5bb68eb467d6cb1dc11fc7ff45c9f4d9

    SHA256

    a004a8670ba8d31156298448b872196e3859501e70960c43f91cb71fbfc9652f

    SHA512

    76b48bdce027385220b7b97b83496f9db4e2011d71f0d3a7c9b196eafb2b310c99fc77c6ef9134b3c4306d00bb682803aa594a4f9473464ddf9ef93369b1f812

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\WPDShextAutoplay.lnk

    Filesize

    1KB

    MD5

    efa701542424fb21742d9d6c19ff630f

    SHA1

    a3d791607e19e5b1444fde5f67b0647d96c2aeed

    SHA256

    bc0b2f60dd2446fea1edaff22e400691a01750d8340d340cf46ece944dd89204

    SHA512

    a4fd0be78577bb74926bacb337891ce022b037b351aa5c0f89a9aa3487d458699e97cde78c147c42ef3ad026fc0dd6179817865033c862fa82e1a3f5ff6d8f72

  • memory/1020-134-0x00000000021C0000-0x00000000021F6000-memory.dmp

    Filesize

    216KB

  • memory/1184-133-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1184-146-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1184-138-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1184-137-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1184-136-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1828-162-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3036-156-0x0000000002F10000-0x0000000002F35000-memory.dmp

    Filesize

    148KB

  • memory/3708-157-0x0000000003870000-0x000000000387B000-memory.dmp

    Filesize

    44KB

  • memory/3708-163-0x0000000003870000-0x000000000387B000-memory.dmp

    Filesize

    44KB