Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:13
Static task
static1
Behavioral task
behavioral1
Sample
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe
Resource
win7-20220812-en
General
-
Target
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe
-
Size
6.2MB
-
MD5
b66c3e5a02f4287c96e433fe130a2cc6
-
SHA1
77955f00cee70fbb6990e4ac07aea4d1a9a8e167
-
SHA256
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d
-
SHA512
89335195b086d7d0c1ab137716535b77f218e4fd8f906ed5c1a0a01e7d62c87d7c17aa23805413d9f42babfa0371f04fa60a5f6a78e9b7bccab4e69bdd08e9ca
-
SSDEEP
98304:cDiT1yf9FYIObKiHC2e9qecljV6XRbo7ktbJnfCBlSx2k8VrhMPS5zIP5/35:cwS5ODzD4XRbo7OblaBDrmq5EP5/35
Malware Config
Extracted
bitrat
1.34
logonapplication.ddns.net:4010
-
communication_password
c4ca4238a0b923820dcc509a6f75849b
-
tor_process
tor
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
RegSvcs.exepid process 3644 RegSvcs.exe 3644 RegSvcs.exe 3644 RegSvcs.exe 3644 RegSvcs.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exeRegSvcs.exedescription pid process target process PID 4416 set thread context of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 3516 set thread context of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 set thread context of 2984 3516 RegSvcs.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeShutdownPrivilege 3644 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegSvcs.exepid process 3644 RegSvcs.exe 3644 RegSvcs.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exeRegSvcs.exedescription pid process target process PID 4416 wrote to memory of 4832 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe schtasks.exe PID 4416 wrote to memory of 4832 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe schtasks.exe PID 4416 wrote to memory of 4832 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe schtasks.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 4416 wrote to memory of 3516 4416 526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 3644 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe PID 3516 wrote to memory of 2984 3516 RegSvcs.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe"C:\Users\Admin\AppData\Local\Temp\526330a5801be45ad490a9057dab40dc70fee6e55258d77e049e98049b25001d.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zGKLtN" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD992.tmp"2⤵
- Creates scheduled task(s)
PID:4832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c713ea94be659c35683dafa4ef8df5bb
SHA151ca1bfaa67cf6f000f64017f3c5265c36e8326b
SHA256796e97e9caa1f382858c1f991721ee7a89b50a2e0f7c78d7624270fc328f5e03
SHA512790b08892347e4d24b7e261c180357ced73f48d48caf3adaabbeb8756c7b62663f45fc85203bd863c5dfc902f8166e7dfaaf6c7c834b17c4e8904a8f90924063