Analysis

  • max time kernel
    160s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 03:38

General

  • Target

    6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df.exe

  • Size

    238KB

  • MD5

    f8715f5098e39d13fa1bfe96fbe3cd0b

  • SHA1

    2bd80a2518ae9e8bb889cfa56310171920532a95

  • SHA256

    6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df

  • SHA512

    6dd0b2f303f44e9ab07ef0657013bf02f39e934bf631606aea9af9ff82069ac0191758c6942ca97b6e096acf0f94e5982761475d226701795e140768adc8f21b

  • SSDEEP

    6144:BwvISTVRlLhA6AOEJUTigG2PqNbFRgsqCqyhbbFDlv6b:BwvHTVy6AOE/gVCblts

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:804
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\%$User_Profile%\SERV.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\%$User_Profile%\SERV.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\%$User_Profile%\SERV.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\%$User_Profile%\SERV.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1588
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\BioCredProv.exe
        "C:\Users\Admin\AppData\Local\Temp\BioCredProv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:1612
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BioCredProv.exe

    Filesize

    238KB

    MD5

    f8715f5098e39d13fa1bfe96fbe3cd0b

    SHA1

    2bd80a2518ae9e8bb889cfa56310171920532a95

    SHA256

    6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df

    SHA512

    6dd0b2f303f44e9ab07ef0657013bf02f39e934bf631606aea9af9ff82069ac0191758c6942ca97b6e096acf0f94e5982761475d226701795e140768adc8f21b

  • C:\Users\Admin\AppData\Local\Temp\BioCredProv.exe

    Filesize

    238KB

    MD5

    f8715f5098e39d13fa1bfe96fbe3cd0b

    SHA1

    2bd80a2518ae9e8bb889cfa56310171920532a95

    SHA256

    6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df

    SHA512

    6dd0b2f303f44e9ab07ef0657013bf02f39e934bf631606aea9af9ff82069ac0191758c6942ca97b6e096acf0f94e5982761475d226701795e140768adc8f21b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe

    Filesize

    13KB

    MD5

    406e0d77797a0e65a5b8e47c4f64f7ef

    SHA1

    bc27e2cd023078b1e5eba518b40d652186e7cdc0

    SHA256

    ac7b35411b98743cd307ef14e29986f355c1cbc835e52199138cc60083cc7911

    SHA512

    ce66ce770c5c3fdee8c6dacb45a99d967239f51409da6b86d7ddbaa6c5823e608d16e0103f4442a2f04f93bc852d73f06a77db5e44bc27f54fca683e43bb3ef1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe

    Filesize

    13KB

    MD5

    406e0d77797a0e65a5b8e47c4f64f7ef

    SHA1

    bc27e2cd023078b1e5eba518b40d652186e7cdc0

    SHA256

    ac7b35411b98743cd307ef14e29986f355c1cbc835e52199138cc60083cc7911

    SHA512

    ce66ce770c5c3fdee8c6dacb45a99d967239f51409da6b86d7ddbaa6c5823e608d16e0103f4442a2f04f93bc852d73f06a77db5e44bc27f54fca683e43bb3ef1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe

    Filesize

    13KB

    MD5

    406e0d77797a0e65a5b8e47c4f64f7ef

    SHA1

    bc27e2cd023078b1e5eba518b40d652186e7cdc0

    SHA256

    ac7b35411b98743cd307ef14e29986f355c1cbc835e52199138cc60083cc7911

    SHA512

    ce66ce770c5c3fdee8c6dacb45a99d967239f51409da6b86d7ddbaa6c5823e608d16e0103f4442a2f04f93bc852d73f06a77db5e44bc27f54fca683e43bb3ef1

  • \Users\Admin\AppData\Local\Temp\BioCredProv.exe

    Filesize

    238KB

    MD5

    f8715f5098e39d13fa1bfe96fbe3cd0b

    SHA1

    2bd80a2518ae9e8bb889cfa56310171920532a95

    SHA256

    6a9131422df3c9003a8fa62a055604d89cc044b2c5415d84496db13580dcb6df

    SHA512

    6dd0b2f303f44e9ab07ef0657013bf02f39e934bf631606aea9af9ff82069ac0191758c6942ca97b6e096acf0f94e5982761475d226701795e140768adc8f21b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe

    Filesize

    13KB

    MD5

    406e0d77797a0e65a5b8e47c4f64f7ef

    SHA1

    bc27e2cd023078b1e5eba518b40d652186e7cdc0

    SHA256

    ac7b35411b98743cd307ef14e29986f355c1cbc835e52199138cc60083cc7911

    SHA512

    ce66ce770c5c3fdee8c6dacb45a99d967239f51409da6b86d7ddbaa6c5823e608d16e0103f4442a2f04f93bc852d73f06a77db5e44bc27f54fca683e43bb3ef1

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\authz.exe

    Filesize

    13KB

    MD5

    406e0d77797a0e65a5b8e47c4f64f7ef

    SHA1

    bc27e2cd023078b1e5eba518b40d652186e7cdc0

    SHA256

    ac7b35411b98743cd307ef14e29986f355c1cbc835e52199138cc60083cc7911

    SHA512

    ce66ce770c5c3fdee8c6dacb45a99d967239f51409da6b86d7ddbaa6c5823e608d16e0103f4442a2f04f93bc852d73f06a77db5e44bc27f54fca683e43bb3ef1

  • memory/1080-87-0x000000000044E000-0x000000000047A000-memory.dmp

    Filesize

    176KB

  • memory/1080-61-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-57-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-58-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-69-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-60-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-67-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-68-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1080-90-0x000000000044E000-0x000000000047A000-memory.dmp

    Filesize

    176KB

  • memory/1080-64-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/1356-54-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/1356-55-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1356-56-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1612-127-0x000000000044E000-0x000000000047A000-memory.dmp

    Filesize

    176KB

  • memory/1628-110-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1628-108-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1796-102-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1796-109-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1880-103-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1880-101-0x00000000744F0000-0x0000000074A9B000-memory.dmp

    Filesize

    5.7MB