Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
4.7MB
-
MD5
fea9e6588163a319883a3b4d9b1f48fe
-
SHA1
56365a251100676323840fa5dfdabaad99f2f772
-
SHA256
92a433340dd32cb379159432fbc26a6f2ca495ef97c31f7fd333913ced03d773
-
SHA512
1ff3265167ee61827fd19818da1bcf8f5abd97fa7cf4f601e7dcab7b19cb5fc14b0b21b7966ed174e5f055344fb97b54791be47e15a8a7642f853ea855d65cab
-
SSDEEP
24576:MztFdtnYQb6VOFv1bdLOqGmXL4pu2OqfNoROKiuHym1fkBonH6X7GUAUTiS0YZRT:
Malware Config
Extracted
bitrat
1.38
gh9st.mywire.org:5005
-
communication_password
803355ca422bf9b37bc523a750e21842
-
install_dir
svcsvc
-
install_file
svcsvc.exe
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tmp.exetmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fsaxd = "\"C:\\Users\\Admin\\AppData\\Roaming\\Fdqudm\\Fsaxd.exe\"" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exeç„€" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
tmp.exepid process 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 4968 set thread context of 3020 4968 tmp.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exetmp.exepid process 4204 powershell.exe 4204 powershell.exe 4968 tmp.exe 4968 tmp.exe 4968 tmp.exe 4968 tmp.exe 4968 tmp.exe 4968 tmp.exe -
Suspicious behavior: RenamesItself 16 IoCs
Processes:
tmp.exepid process 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe 3020 tmp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exetmp.exetmp.exedescription pid process Token: SeDebugPrivilege 4204 powershell.exe Token: SeDebugPrivilege 4968 tmp.exe Token: SeShutdownPrivilege 3020 tmp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
tmp.exepid process 3020 tmp.exe 3020 tmp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
tmp.exedescription pid process target process PID 4968 wrote to memory of 4204 4968 tmp.exe powershell.exe PID 4968 wrote to memory of 4204 4968 tmp.exe powershell.exe PID 4968 wrote to memory of 4204 4968 tmp.exe powershell.exe PID 4968 wrote to memory of 3120 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3120 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3120 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3712 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3712 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3712 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe PID 4968 wrote to memory of 3020 4968 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3020