Analysis

  • max time kernel
    150s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:49

General

  • Target

    1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe

  • Size

    416KB

  • MD5

    5ac2af7ef78cacb1e54321a938aec045

  • SHA1

    949d5734c40864f7ec3b291059fa7448badf37ea

  • SHA256

    1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e

  • SHA512

    dae6ccb702480a634fea987b2d2d876e2cd96a73345c2beb173e873eb27b5cf7bba26b74cd043a95a0e7f867aff15393903f4b70ace3280ac93a4d3d7499904c

  • SSDEEP

    12288:gmNOqos4qQXvvcKKHGVuO+RfwWs3ODb3lI:vx+uOuseDbl

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe
    "C:\Users\Admin\AppData\Local\Temp\1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe
      "C:\Users\Admin\AppData\Local\Temp\1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Looks for VirtualBox Guest Additions in registry
      • Adds policy Run key to start application
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Control Panel
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1804
      • C:\Users\Admin\AppData\Local\Temp\tmpB0F8.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpB0F8.exe" "C:\Users\Admin\AppData\Local\Temp\1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e.exe"
        3⤵
        • Executes dropped EXE
        PID:668
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping 127.0.0.1 >> nul
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          PID:1700
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.bin\S-1-5-21-3406023954-474543476-3319432036-1000\$ast-S-1-5-21-3406023954-474543476-3319432036-1000\22sg1RNmlNzbxy42tPV60n21NkWW.dat

    Filesize

    130KB

    MD5

    1567307b20bddf9fe092509ffa12f017

    SHA1

    64fb30f14a86083b227ee0c5580230911ab8d435

    SHA256

    6d2e2d2c8d01ec688b1349baca259b21fa93f2646b6c4527e5150d231d052f1f

    SHA512

    a4fdb95950cf99ead9e3e0544c008c3757c0de4302e20714e66c4555ded3121114a92b54de8b0314e7514406edd4129b51ab782ef2b29a3310755dacdb31df7f

  • C:\$Recycle.bin\S-1-5-21-3406023954-474543476-3319432036-1000\$ast-S-1-5-21-3406023954-474543476-3319432036-1000\a9UlKAQARMP6hVou.dat

    Filesize

    21KB

    MD5

    23f58c0c2e1f9e3c9d05f340d5d501f9

    SHA1

    8a8983c0b122d3dc535d0de5a3a58e8444170916

    SHA256

    147104a10157e98091eda964c6ba421d48078c9766a20b08c837cf63472af17e

    SHA512

    893b082225c8fbcb8763000d5082b09c5883dd1f326b115fd28b67d8f7b26d6b8af9cc669428e19a6146768e8ac5e7554d16d8a6bb0784844fa6bc2e78381d3d

  • C:\$Recycle.bin\S-1-5-21-3406023954-474543476-3319432036-1000\$ast-S-1-5-21-3406023954-474543476-3319432036-1000\rLotdfEcbKxWCukM4hZueMov.dat

    Filesize

    5KB

    MD5

    8f1c6a4b7cbe91695f555325970cd29b

    SHA1

    56ea1f746c9c7a6aa35cd2369d05d2cbafdc8dc2

    SHA256

    96d96d6ac18d7625896a3ba034929e39be93482f903fa993e2f4d21041f10a06

    SHA512

    a8c8e8a7f719d3f8974b1845872f80837bbe44ee0f6511fb65928c9af366130b11bd8697d942ba1abfc9fc435872725c9f0e34344edb70857e96154fe76b6bd2

  • C:\Users\Admin\AppData\Local\Temp\tmpB0F8.exe

    Filesize

    416KB

    MD5

    5ac2af7ef78cacb1e54321a938aec045

    SHA1

    949d5734c40864f7ec3b291059fa7448badf37ea

    SHA256

    1ee8eaa2d5a11ba162d890542b8f1e5c54cfc3ff98e27e7f51fcf33f7fd6097e

    SHA512

    dae6ccb702480a634fea987b2d2d876e2cd96a73345c2beb173e873eb27b5cf7bba26b74cd043a95a0e7f867aff15393903f4b70ace3280ac93a4d3d7499904c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\gpresult.lnk

    Filesize

    1KB

    MD5

    472c70c52246d0c02716d63beaba2503

    SHA1

    a1f8dc351f10d3df9632e33ee6ab22aca3473319

    SHA256

    9c204875c7300a47a05a845c5fb4032d261465d7d46358abf0929165acaa99f5

    SHA512

    c93bba4de855bb2a2b1ccea68d70a0a83c9fe9e4dae0fb83b0897df81893c967a4078af247fc9acbbeece37f2b45825222db25b736572b3d70dc44e8fdc3b723

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\gpresult.exe

    Filesize

    130KB

    MD5

    c9ee8262d460488f6b51312e15ff9934

    SHA1

    d8bcc7546017ef31be02fe20a77fe4a6b144086a

    SHA256

    3bf69a0352f137e0e41de4f11949c79908319253ea6af9e5d022c4853a872af4

    SHA512

    42b81243343ac0e5036874157630533756c37398b926d996c5af054a36c499c729383ae000b6167485b07ec10ae53566325ba2aed209d8c3ba55582134c2ef7a

  • memory/644-85-0x0000000000000000-mapping.dmp

  • memory/668-75-0x0000000000000000-mapping.dmp

  • memory/856-60-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-68-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-64-0x0000000000403212-mapping.dmp

  • memory/856-63-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-56-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-79-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-66-0x00000000760D1000-0x00000000760D3000-memory.dmp

    Filesize

    8KB

  • memory/856-58-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-61-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-55-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/856-67-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/892-78-0x0000000000000000-mapping.dmp

  • memory/1208-89-0x0000000002A60000-0x0000000002A85000-memory.dmp

    Filesize

    148KB

  • memory/1700-83-0x0000000000000000-mapping.dmp

  • memory/1804-91-0x0000000000730000-0x000000000073B000-memory.dmp

    Filesize

    44KB

  • memory/1804-73-0x0000000000000000-mapping.dmp

  • memory/1804-81-0x000007FEFC2D1000-0x000007FEFC2D3000-memory.dmp

    Filesize

    8KB

  • memory/1804-90-0x0000000000730000-0x000000000073B000-memory.dmp

    Filesize

    44KB