Analysis

  • max time kernel
    205s
  • max time network
    223s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 00:57

General

  • Target

    4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe

  • Size

    306KB

  • MD5

    0cefbb3733325fbf69db7ae198f7e654

  • SHA1

    c4ad28644ad93bd799af62b2617d175da2c68400

  • SHA256

    4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85

  • SHA512

    9cd04464d648e4082009a5dc4d7a24fa198556b0b9db25062c1f7ebb2af1568cffcf20987e7c6d4ba5d4bb61a24f1f143aaebf0671d51092f76f166770cb88e5

  • SSDEEP

    6144:xfNdLF0ocp0dyd+97C6H8nnMHPer11XgUfcgxFomgXHsMjoSp:xFdLF9S0deQJ8n7RkgxFZgXxoSp

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe
    "C:\Users\Admin\AppData\Local\Temp\4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lHsKg.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2344
    • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe
      "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe
        "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4528
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1356
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:3880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4036
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:5084
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4740
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:5068
      • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe
        "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lHsKg.bat

    Filesize

    152B

    MD5

    49bb161b07149b1bda99901c71d98b1f

    SHA1

    e5e3b389c09d551bd8f3a4cf71ee30e566fdf6e2

    SHA256

    734c4f48449a118dbdfbbe4971ecf112b26b2b45d1889678c01dea98eb5767d8

    SHA512

    da09a2af9b7f9528916ab719ed97ee8b61179bba92016eaed64b3e7d6bf08646801aeeb0eb332bdde175eb64b48106f7cf2fe2bf01ea6128753e4ce1d48707be

  • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe

    Filesize

    306KB

    MD5

    947b3f4ad7069ee0fa5b022002e5d192

    SHA1

    a31839238ee3b02b8c4615aacc1b52fb715ee66e

    SHA256

    7b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b

    SHA512

    486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a

  • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe

    Filesize

    306KB

    MD5

    947b3f4ad7069ee0fa5b022002e5d192

    SHA1

    a31839238ee3b02b8c4615aacc1b52fb715ee66e

    SHA256

    7b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b

    SHA512

    486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a

  • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe

    Filesize

    306KB

    MD5

    947b3f4ad7069ee0fa5b022002e5d192

    SHA1

    a31839238ee3b02b8c4615aacc1b52fb715ee66e

    SHA256

    7b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b

    SHA512

    486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a

  • C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe

    Filesize

    306KB

    MD5

    947b3f4ad7069ee0fa5b022002e5d192

    SHA1

    a31839238ee3b02b8c4615aacc1b52fb715ee66e

    SHA256

    7b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b

    SHA512

    486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a

  • memory/1120-160-0x0000000000400000-0x00000000005C9000-memory.dmp

    Filesize

    1.8MB

  • memory/1120-145-0x0000000000400000-0x00000000005C9000-memory.dmp

    Filesize

    1.8MB

  • memory/2148-146-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2148-149-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2148-151-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2148-171-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2148-173-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2336-152-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2336-172-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2336-156-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2336-158-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3180-141-0x0000000000400000-0x00000000005C9000-memory.dmp

    Filesize

    1.8MB

  • memory/3180-134-0x0000000000400000-0x00000000005C9000-memory.dmp

    Filesize

    1.8MB