Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:39

General

  • Target

    1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe

  • Size

    49KB

  • MD5

    66fccc97b5cbec264ae902e094182904

  • SHA1

    ac57e923e4ed2438b72668477a0154edc2bde585

  • SHA256

    1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14

  • SHA512

    10ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259

  • SSDEEP

    768:eokswQQnAQ/rZSwk5ALCdB2DWG+qkCW78Yni1XH3XJzdqWPZBuUYIKsZEYbo7A:9kswQDYrZo5isPqo78fXJzgW5pxk7A

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Checks processor information in registry 2 TTPs 27 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
    "C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
      C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1568
          4⤵
          • Drops file in Windows directory
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1660
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1592
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3544
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1700
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4168
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4340
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 988
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3356
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3584
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 872
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:2280
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1008
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4260
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 924
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1092
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1640
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4924
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1592
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1576
      • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
        3⤵
        • Executes dropped EXE
        PID:4048

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nscF3EC.tmp\System.dll
    Filesize

    11KB

    MD5

    a436db0c473a087eb61ff5c53c34ba27

    SHA1

    65ea67e424e75f5065132b539c8b2eda88aa0506

    SHA256

    75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

    SHA512

    908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

  • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
    Filesize

    49KB

    MD5

    66fccc97b5cbec264ae902e094182904

    SHA1

    ac57e923e4ed2438b72668477a0154edc2bde585

    SHA256

    1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14

    SHA512

    10ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259

  • C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe
    Filesize

    49KB

    MD5

    66fccc97b5cbec264ae902e094182904

    SHA1

    ac57e923e4ed2438b72668477a0154edc2bde585

    SHA256

    1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14

    SHA512

    10ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • C:\Users\Admin\AppData\Roaming\sychost\sychost.exe
    Filesize

    24KB

    MD5

    a45321be660b0dbd93d6a2ea208f19bb

    SHA1

    04925aaee56724371ea040b223ed93a1b38b1c26

    SHA256

    aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38

    SHA512

    c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4

  • memory/372-172-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/372-167-0x0000000000000000-mapping.dmp
  • memory/372-169-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/372-170-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1092-177-0x0000000000000000-mapping.dmp
  • memory/1364-178-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1364-173-0x0000000000000000-mapping.dmp
  • memory/1364-175-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1364-176-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1576-189-0x0000000000000000-mapping.dmp
  • memory/1660-141-0x0000000000000000-mapping.dmp
  • memory/2112-148-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-146-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-145-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/2112-143-0x0000000000000000-mapping.dmp
  • memory/2280-165-0x0000000000000000-mapping.dmp
  • memory/3104-181-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/3104-182-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/3104-179-0x0000000000000000-mapping.dmp
  • memory/3104-184-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/3356-159-0x0000000000000000-mapping.dmp
  • memory/3544-147-0x0000000000000000-mapping.dmp
  • memory/3584-161-0x0000000000000000-mapping.dmp
  • memory/3584-166-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/3584-164-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/3584-163-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4048-191-0x0000000000000000-mapping.dmp
  • memory/4048-193-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4168-153-0x0000000000000000-mapping.dmp
  • memory/4260-171-0x0000000000000000-mapping.dmp
  • memory/4304-154-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4304-149-0x0000000000000000-mapping.dmp
  • memory/4304-151-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4304-152-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4340-155-0x0000000000000000-mapping.dmp
  • memory/4340-158-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4340-160-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4340-157-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4844-187-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4844-185-0x0000000000000000-mapping.dmp
  • memory/4844-188-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4844-190-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4896-133-0x0000000000000000-mapping.dmp
  • memory/4924-183-0x0000000000000000-mapping.dmp
  • memory/4948-139-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4948-140-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB

  • memory/4948-136-0x0000000000000000-mapping.dmp
  • memory/4948-142-0x0000000074640000-0x0000000074BF1000-memory.dmp
    Filesize

    5.7MB