Analysis

  • max time kernel
    293s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:45

General

  • Target

    1aeb51a19fb0162d8c0cf5bc27f666a2885d4497b1738f6ad9c7125a8bc3c2d9.iso

  • Size

    2.2MB

  • MD5

    433a0a097c40a68bd4eca0835ec2184a

  • SHA1

    f8392615cfe5b99f806e6cd41017abec0d0c8ecc

  • SHA256

    1aeb51a19fb0162d8c0cf5bc27f666a2885d4497b1738f6ad9c7125a8bc3c2d9

  • SHA512

    260c6d4f893132c7944c02e88a25e50aaa7439c4b697e23cff50696abb4ae24b445eac49dfbc38834d154f6b8ab31bdd2f85935cb11f516eed95597c1876f8f9

  • SSDEEP

    12288:1vv4GnTnYe1RvjMYTig+63sdEnmYRDJNh+7ShcBh2OQBnnnnnnEtbdjdvwKx:1vhnbRBhirxdEdBJumhcz2dBnnARu

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1aeb51a19fb0162d8c0cf5bc27f666a2885d4497b1738f6ad9c7125a8bc3c2d9.iso
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1972
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" shell32.dll,Control_RunDLL inetcpl.cpl,,0
    1⤵
      PID:980
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1792
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /q /c "System Volume Information\  \ \ \test.chs"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3860
        • \??\E:\System Volume Information\  \ \ \test.chs
          "System Volume Information\  \ \ \test.chs"
          2⤵
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
            "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Unilateral statement by the Commission on migration.docx" /o ""
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:4468
          • C:\ProgramData\Intelnet\LMIGuardianSvc.exe
            C:\ProgramData\Intelnet\LMIGuardianSvc.exe E711
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2308
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c powershell "(new-object -COM Shell.Application).NameSpace(17).ParseName('E:').InvokeVerb('Eject')"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3336
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell "(new-object -COM Shell.Application).NameSpace(17).ParseName('E:').InvokeVerb('Eject')"
                5⤵
                • Enumerates connected drives
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4420

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Intelnet\LMIGuardianDll.dll

        Filesize

        78KB

        MD5

        e772a191d58d3e2199a3372a68d086d8

        SHA1

        dd0b2dfd602067165c87c20e46e013b7252cfb98

        SHA256

        b35a9716e180b6a4cc92ccdc5d5825c62a41b4f13c0e38b757b2f47b202fc012

        SHA512

        39ebf36882c5e75e25b0039c69e716149df1a1d9b39b957c5664a3a62813f62a3e8917cf5eedaaece35ce2b30423abf64e417c49836ef3cf3c038cd356788afe

      • C:\ProgramData\Intelnet\LMIGuardianDll.dll

        Filesize

        78KB

        MD5

        e772a191d58d3e2199a3372a68d086d8

        SHA1

        dd0b2dfd602067165c87c20e46e013b7252cfb98

        SHA256

        b35a9716e180b6a4cc92ccdc5d5825c62a41b4f13c0e38b757b2f47b202fc012

        SHA512

        39ebf36882c5e75e25b0039c69e716149df1a1d9b39b957c5664a3a62813f62a3e8917cf5eedaaece35ce2b30423abf64e417c49836ef3cf3c038cd356788afe

      • C:\ProgramData\Intelnet\LMIGuardianSvc.exe

        Filesize

        395KB

        MD5

        93a4e2b886e2815b6b732a2380b0f068

        SHA1

        5cbfa13b74917aabbfb4d714c53afb1ac20b10e6

        SHA256

        26c855264896db95ed46e502f2d318e5f2ad25b59bdc47bd7ffe92646102ae0d

        SHA512

        230cedc2543d05ac39693cf79d0a2e571f06c198f32a70449b9f36d76202debc53373864ec34cb95cc94d26a54803224a615535fa4826c81e4e519c64fdd1904

      • C:\ProgramData\Intelnet\LMIGuardianSvc.exe

        Filesize

        395KB

        MD5

        93a4e2b886e2815b6b732a2380b0f068

        SHA1

        5cbfa13b74917aabbfb4d714c53afb1ac20b10e6

        SHA256

        26c855264896db95ed46e502f2d318e5f2ad25b59bdc47bd7ffe92646102ae0d

        SHA512

        230cedc2543d05ac39693cf79d0a2e571f06c198f32a70449b9f36d76202debc53373864ec34cb95cc94d26a54803224a615535fa4826c81e4e519c64fdd1904

      • C:\ProgramData\helps\LMIGuardianDat.dat

        Filesize

        588KB

        MD5

        af04133797c7781c25980a8a004ea861

        SHA1

        6a9a5c1e23a17773a8243dda211871ca8da03a4d

        SHA256

        d6e0903b9d9464c90c2007d84e8cf2387359c693a04c349cf0b551e65f860181

        SHA512

        3c69f0d743715f2b104fbb9e4d330f8e263bb8cb03be62f4be91b65346f5b1f3449e7eaa86c77c4be641030a3747d1ffce303c389b637202b39c716c07ee7a4c

      • C:\Users\Admin\AppData\Local\Temp\Unilateral statement by the Commission on migration.docx

        Filesize

        14KB

        MD5

        2af14bcd1c2ffec278e2f52da0eb074b

        SHA1

        d3edf0af3e665e6088a17dc6f03ac6906de27940

        SHA256

        46e6fa282d50b59911063a805c23d2b3ca673f4899172b84386ddbc48dd88132

        SHA512

        f808f8d84de5f524d1ca04e283641756d5b5938400642100c1c1d73664c070e15fc23d346fa011b4e58fba051f6db680455f74381a8b6a95b8a3d9f24864457d

      • memory/1456-133-0x0000000010000000-0x0000000010099000-memory.dmp

        Filesize

        612KB

      • memory/1456-137-0x0000000000EC7000-0x0000000000F5B000-memory.dmp

        Filesize

        592KB

      • memory/1456-132-0x0000000000000000-mapping.dmp

      • memory/2308-145-0x0000000000000000-mapping.dmp

      • memory/2308-156-0x0000000000A7C000-0x0000000000B10000-memory.dmp

        Filesize

        592KB

      • memory/3336-157-0x0000000000000000-mapping.dmp

      • memory/4420-160-0x00000000022C0000-0x00000000022F6000-memory.dmp

        Filesize

        216KB

      • memory/4420-162-0x0000000004C70000-0x0000000004C92000-memory.dmp

        Filesize

        136KB

      • memory/4420-163-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/4420-164-0x00000000055B0000-0x0000000005616000-memory.dmp

        Filesize

        408KB

      • memory/4420-165-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

        Filesize

        120KB

      • memory/4420-166-0x0000000007260000-0x00000000078DA000-memory.dmp

        Filesize

        6.5MB

      • memory/4420-161-0x0000000004F10000-0x0000000005538000-memory.dmp

        Filesize

        6.2MB

      • memory/4420-158-0x0000000000000000-mapping.dmp

      • memory/4420-167-0x0000000006110000-0x000000000612A000-memory.dmp

        Filesize

        104KB

      • memory/4468-143-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-155-0x00007FFC09650000-0x00007FFC09660000-memory.dmp

        Filesize

        64KB

      • memory/4468-144-0x00007FFC09650000-0x00007FFC09660000-memory.dmp

        Filesize

        64KB

      • memory/4468-142-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-141-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-140-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-139-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-138-0x0000000000000000-mapping.dmp

      • memory/4468-169-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-170-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-171-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB

      • memory/4468-172-0x00007FFC0BFB0000-0x00007FFC0BFC0000-memory.dmp

        Filesize

        64KB