Analysis
-
max time kernel
154s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe
Resource
win10v2004-20220812-en
General
-
Target
997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe
-
Size
271KB
-
MD5
086a8facde06254fc5ab071bddaa3e7e
-
SHA1
a5af24126dc17f26b87fe8fd96e20ca147dc36e2
-
SHA256
997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633
-
SHA512
2cc4dbebe9e89f01a20d459baab726c9c07727724824cfb976229eea86442cfff68a8dcf4edbe178c4d6030eabab420c3564054b7ba699361fe188e8d6d64bb8
-
SSDEEP
6144:6o8/m9hh9u6KMCgLpIzAsy2RlxbQE57R4fVdYJGEZBcUU:N8+aqpmAmlFQW7qfQJGwcn
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\Non.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Non.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\AppLaunch.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 2 IoCs
pid Process 400 mtvdemd.exe 1884 hpwebregUI.exe -
resource yara_rule behavioral2/memory/1576-134-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1576-136-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1576-137-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1576-138-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation mtvdemd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\© Microsoft Real Time Media Stack = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\mtvdemd.exe" mtvdemd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3668 set thread context of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 1884 set thread context of 1640 1884 hpwebregUI.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 4160 reg.exe 848 reg.exe 4208 reg.exe 3500 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe 400 mtvdemd.exe 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 1884 hpwebregUI.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe Token: 1 1576 AppLaunch.exe Token: SeCreateTokenPrivilege 1576 AppLaunch.exe Token: SeAssignPrimaryTokenPrivilege 1576 AppLaunch.exe Token: SeLockMemoryPrivilege 1576 AppLaunch.exe Token: SeIncreaseQuotaPrivilege 1576 AppLaunch.exe Token: SeMachineAccountPrivilege 1576 AppLaunch.exe Token: SeTcbPrivilege 1576 AppLaunch.exe Token: SeSecurityPrivilege 1576 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1576 AppLaunch.exe Token: SeLoadDriverPrivilege 1576 AppLaunch.exe Token: SeSystemProfilePrivilege 1576 AppLaunch.exe Token: SeSystemtimePrivilege 1576 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1576 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1576 AppLaunch.exe Token: SeCreatePagefilePrivilege 1576 AppLaunch.exe Token: SeCreatePermanentPrivilege 1576 AppLaunch.exe Token: SeBackupPrivilege 1576 AppLaunch.exe Token: SeRestorePrivilege 1576 AppLaunch.exe Token: SeShutdownPrivilege 1576 AppLaunch.exe Token: SeDebugPrivilege 1576 AppLaunch.exe Token: SeAuditPrivilege 1576 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1576 AppLaunch.exe Token: SeChangeNotifyPrivilege 1576 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1576 AppLaunch.exe Token: SeUndockPrivilege 1576 AppLaunch.exe Token: SeSyncAgentPrivilege 1576 AppLaunch.exe Token: SeEnableDelegationPrivilege 1576 AppLaunch.exe Token: SeManageVolumePrivilege 1576 AppLaunch.exe Token: SeImpersonatePrivilege 1576 AppLaunch.exe Token: SeCreateGlobalPrivilege 1576 AppLaunch.exe Token: 31 1576 AppLaunch.exe Token: 32 1576 AppLaunch.exe Token: 33 1576 AppLaunch.exe Token: 34 1576 AppLaunch.exe Token: 35 1576 AppLaunch.exe Token: SeDebugPrivilege 400 mtvdemd.exe Token: SeDebugPrivilege 1884 hpwebregUI.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1576 AppLaunch.exe 1576 AppLaunch.exe 1576 AppLaunch.exe 1640 AppLaunch.exe 1640 AppLaunch.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 3668 wrote to memory of 1576 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 79 PID 1576 wrote to memory of 3480 1576 AppLaunch.exe 85 PID 1576 wrote to memory of 3480 1576 AppLaunch.exe 85 PID 1576 wrote to memory of 3480 1576 AppLaunch.exe 85 PID 1576 wrote to memory of 3932 1576 AppLaunch.exe 84 PID 1576 wrote to memory of 3932 1576 AppLaunch.exe 84 PID 1576 wrote to memory of 3932 1576 AppLaunch.exe 84 PID 1576 wrote to memory of 4580 1576 AppLaunch.exe 80 PID 1576 wrote to memory of 4580 1576 AppLaunch.exe 80 PID 1576 wrote to memory of 4580 1576 AppLaunch.exe 80 PID 1576 wrote to memory of 4824 1576 AppLaunch.exe 83 PID 1576 wrote to memory of 4824 1576 AppLaunch.exe 83 PID 1576 wrote to memory of 4824 1576 AppLaunch.exe 83 PID 4580 wrote to memory of 4208 4580 cmd.exe 90 PID 4580 wrote to memory of 4208 4580 cmd.exe 90 PID 4580 wrote to memory of 4208 4580 cmd.exe 90 PID 3480 wrote to memory of 4160 3480 cmd.exe 88 PID 3480 wrote to memory of 4160 3480 cmd.exe 88 PID 3480 wrote to memory of 4160 3480 cmd.exe 88 PID 4824 wrote to memory of 848 4824 cmd.exe 89 PID 4824 wrote to memory of 848 4824 cmd.exe 89 PID 4824 wrote to memory of 848 4824 cmd.exe 89 PID 3932 wrote to memory of 3500 3932 cmd.exe 91 PID 3932 wrote to memory of 3500 3932 cmd.exe 91 PID 3932 wrote to memory of 3500 3932 cmd.exe 91 PID 3668 wrote to memory of 400 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 92 PID 3668 wrote to memory of 400 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 92 PID 3668 wrote to memory of 400 3668 997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe 92 PID 400 wrote to memory of 1884 400 mtvdemd.exe 93 PID 400 wrote to memory of 1884 400 mtvdemd.exe 93 PID 400 wrote to memory of 1884 400 mtvdemd.exe 93 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94 PID 1884 wrote to memory of 1640 1884 hpwebregUI.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe"C:\Users\Admin\AppData\Local\Temp\997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Non.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Non.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Non.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Non.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\mtvdemd.exe"C:\Users\Admin\AppData\Local\Temp\System\mtvdemd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\System\hpwebregUI.exe"C:\Users\Admin\AppData\Local\Temp\System\hpwebregUI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD5086a8facde06254fc5ab071bddaa3e7e
SHA1a5af24126dc17f26b87fe8fd96e20ca147dc36e2
SHA256997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633
SHA5122cc4dbebe9e89f01a20d459baab726c9c07727724824cfb976229eea86442cfff68a8dcf4edbe178c4d6030eabab420c3564054b7ba699361fe188e8d6d64bb8
-
Filesize
271KB
MD5086a8facde06254fc5ab071bddaa3e7e
SHA1a5af24126dc17f26b87fe8fd96e20ca147dc36e2
SHA256997a979276b1a67e3d20d3f23862d17bd85c2ccad9fe412c8364fe7068a55633
SHA5122cc4dbebe9e89f01a20d459baab726c9c07727724824cfb976229eea86442cfff68a8dcf4edbe178c4d6030eabab420c3564054b7ba699361fe188e8d6d64bb8
-
Filesize
41KB
MD5788083fc30f8684249e619e27a537e89
SHA133094a763aea74ebaf173661010795ed7b043f1a
SHA2569343c5432689743a510b21b52999446b822e3464f8916ab61039d9648766e8ce
SHA512053fd245582d837a91367749c83fccabd45ad8391c9ce30d54991163c81b9c0c2b0fd40082d1453ea360f10007f06031b7fd933e2ba6823d48123401faabefd1
-
Filesize
41KB
MD5788083fc30f8684249e619e27a537e89
SHA133094a763aea74ebaf173661010795ed7b043f1a
SHA2569343c5432689743a510b21b52999446b822e3464f8916ab61039d9648766e8ce
SHA512053fd245582d837a91367749c83fccabd45ad8391c9ce30d54991163c81b9c0c2b0fd40082d1453ea360f10007f06031b7fd933e2ba6823d48123401faabefd1