Analysis

  • max time kernel
    149s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:44

General

  • Target

    dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe

  • Size

    1.6MB

  • MD5

    f693274485f1ef10524eaee98f7d6a4b

  • SHA1

    bd6a49605d9e71c97bacff6e3efadc1ef03f9320

  • SHA256

    dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

  • SHA512

    d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

  • SSDEEP

    49152:O89RVp7kcF1FgcY9XTxIplFX4xddcjkX3zRvioUikp9Q:O89RX7rFva9XTAFyMQRvtr

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
    "C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Users\Admin\AppData\Local\Temp\e57be10.tmp
      >C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
        "C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Checks processor information in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /query /tn PCYac
          4⤵
            PID:1268
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /tn PCYac /tr "\"C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"" /f /sc onlogon /rl highest
            4⤵
            • Creates scheduled task(s)
            PID:1136
        • C:\Users\Admin\AppData\Local\Temp\e57bf29.exe
          "C:\Users\Admin\AppData\Local\Temp\\e57bf29.exe"
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Sets service image path in registry
          • Installs/modifies Browser Helper Object
          • Maps connected drives based on registry
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\Windows\SysWOW64\wshtcpip.dll
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:3516
            • C:\Windows\SysWOW64\icacls.exe
              icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:748
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2236
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\Windows\SysWOW64\midimap.dll
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:3056
            • C:\Windows\SysWOW64\icacls.exe
              icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:2912
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat
            4⤵
              PID:4972

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Browser Extensions

      1
      T1176

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      2
      T1112

      File Permissions Modification

      1
      T1222

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ahnmove.bat
        Filesize

        179B

        MD5

        07b1b42e6384a59d9f2f3a7c893545fe

        SHA1

        9eef0a185b7178f4533ee7c715bbb0c11b7cccf7

        SHA256

        8637b71f262ebbe657e7644bbd00595e5bdfd5235775fd50b1fd9ae45ead31d8

        SHA512

        2a5ace1ea06ff303f0850a1ac0383f0baf653425de8827cdae6f22e0e6db1978a98729bf4d3eb1a3d4f81b65a9eacfa4b888e817845fd1e8c2b3f5cb4685f814

      • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
        Filesize

        884KB

        MD5

        61b8a7d26292c0a5f7f882b5cedb8816

        SHA1

        14665cd44b2804172f46a0d1375c88959f72d797

        SHA256

        4a881ab330b90c611601b2b92173c201aeb036546d042421df77d9e713c1a767

        SHA512

        bda52e47b18376f7c577cd8a874da84809bdb504739fdd56ee40b92eae738c8dc54cc73243982a1104e324792d9abe1349123e2f5ffa6250a6388f81f131d62e

      • C:\Users\Admin\AppData\Local\Temp\e57be10.tmp
        Filesize

        1.6MB

        MD5

        f693274485f1ef10524eaee98f7d6a4b

        SHA1

        bd6a49605d9e71c97bacff6e3efadc1ef03f9320

        SHA256

        dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

        SHA512

        d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

      • C:\Users\Admin\AppData\Local\Temp\e57be10.tmp
        Filesize

        1.6MB

        MD5

        f693274485f1ef10524eaee98f7d6a4b

        SHA1

        bd6a49605d9e71c97bacff6e3efadc1ef03f9320

        SHA256

        dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

        SHA512

        d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

      • C:\Users\Admin\AppData\Local\Temp\e57bf29.exe
        Filesize

        716KB

        MD5

        7c565c9eebdd01bc69cb63dcca072fd0

        SHA1

        68e846eae6c1c2d618898b9f6e90e068dd881aa1

        SHA256

        0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

        SHA512

        7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

      • C:\Users\Admin\AppData\Local\Temp\e57bf29.exe
        Filesize

        716KB

        MD5

        7c565c9eebdd01bc69cb63dcca072fd0

        SHA1

        68e846eae6c1c2d618898b9f6e90e068dd881aa1

        SHA256

        0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

        SHA512

        7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

      • memory/748-152-0x0000000000000000-mapping.dmp
      • memory/1136-147-0x0000000000000000-mapping.dmp
      • memory/1268-146-0x0000000000000000-mapping.dmp
      • memory/2056-150-0x0000000000000000-mapping.dmp
      • memory/2236-153-0x0000000000000000-mapping.dmp
      • memory/2912-155-0x0000000000000000-mapping.dmp
      • memory/3056-154-0x0000000000000000-mapping.dmp
      • memory/3516-151-0x0000000000000000-mapping.dmp
      • memory/3756-140-0x0000000000400000-0x0000000000806000-memory.dmp
        Filesize

        4.0MB

      • memory/3756-137-0x0000000000000000-mapping.dmp
      • memory/3756-148-0x0000000000400000-0x0000000000806000-memory.dmp
        Filesize

        4.0MB

      • memory/3852-139-0x0000000000000000-mapping.dmp
      • memory/3852-149-0x0000000001000000-0x0000000001BC7000-memory.dmp
        Filesize

        11.8MB

      • memory/3852-144-0x0000000000430000-0x0000000000450000-memory.dmp
        Filesize

        128KB

      • memory/3852-145-0x0000000001000000-0x0000000001BC7000-memory.dmp
        Filesize

        11.8MB

      • memory/3852-157-0x0000000001000000-0x0000000001BC7000-memory.dmp
        Filesize

        11.8MB

      • memory/3904-143-0x0000000000400000-0x000000000040C000-memory.dmp
        Filesize

        48KB

      • memory/3904-133-0x0000000000000000-mapping.dmp
      • memory/4068-132-0x0000000000400000-0x000000000040C000-memory.dmp
        Filesize

        48KB

      • memory/4068-136-0x0000000000400000-0x000000000040C000-memory.dmp
        Filesize

        48KB

      • memory/4972-156-0x0000000000000000-mapping.dmp