Analysis

  • max time kernel
    169s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 11:38

General

  • Target

    34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd.exe

  • Size

    1008KB

  • MD5

    2070b69a9cda563b21f779f6a0fa1330

  • SHA1

    0a6efa5cc99b5b9b8cd4d623e43671d035e910f4

  • SHA256

    34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd

  • SHA512

    c73a118eb3d332aac480e8bb13538a24251adedac664c248b540c1ba26cce0420a122440fc5fbbe2ad04a523bba1565c4caef6a9bc9be9312d5276531fa10846

  • SSDEEP

    24576:aM5ZXrFPTjft7CNJ8xmvQ9811eHu8vJSx38VtS:3BK8Io97y3itS

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 46 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd.exe
    "C:\Users\Admin\AppData\Local\Temp\34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2368
  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:216
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe

    Filesize

    2.0MB

    MD5

    ac237bdfae2ef6790ab175fb28f86897

    SHA1

    e776c90a7f46e16f52d528de874f2c18cd3cd758

    SHA256

    6cc7f56637fcd10785e23f80c3fa6051b1854ba832a753e1845e4ff6002f3c42

    SHA512

    687da715462a55e4f4fff5dcf495688480871eb1db87ce59a81e2ed76e8b15fda5f2bc77f108f22978362000eed307d39842f72555d3d3cade48109b0ee6d475

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • \??\c:\windows\system32\Appvclient.exe

    Filesize

    1.3MB

    MD5

    c02ff5d91b985f9a4a9e3673048a661e

    SHA1

    a6699b2238cb335a8f6ab4082837506667379cb4

    SHA256

    7e0631220236de19d02edd13212957d69beca279ffff09b11c7a1a6d6c03f831

    SHA512

    774dbd5b2a2308a9bd91f2a618d92cb439d9a26088e0f9bc1959fd1d0ceaeaad79944130db946dac9b452f2e696a404ac0925678becd81fb03ddbba0c4dba12b

  • \??\c:\windows\system32\fxssvc.exe

    Filesize

    1.2MB

    MD5

    babe7ba1358ad447ae99b86e02e3df41

    SHA1

    e3b3cdd3e7342ed12a8349bcdd88490e8c0d4857

    SHA256

    b25fc8bacd08d1bc47bbf4f29630e050d11671002c6cc6d47c00c749f9e5c781

    SHA512

    0fbce6116f0c5324538cf39c8bcc85a8cfd1cd17ba0c87ab2c38ef36486e22a3e9aa0bb5156029082bffe59de7a90c4b1e81ca6e7766191b0a52b18e347d3195

  • memory/216-136-0x0000000140000000-0x00000001403FF000-memory.dmp

    Filesize

    4.0MB

  • memory/216-139-0x0000000140000000-0x00000001403FF000-memory.dmp

    Filesize

    4.0MB

  • memory/2368-132-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB

  • memory/2368-133-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB

  • memory/2368-135-0x0000000000400000-0x00000000006D8000-memory.dmp

    Filesize

    2.8MB