Analysis

  • max time kernel
    190s
  • max time network
    234s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 19:03

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    629928a08a33a9a226b3922273c8ba95

  • SHA1

    5f7dfc896763e242e039ac513f4ddb3db1077467

  • SHA256

    0f3fe0c5e38cbabd6d0e2622586d5d1850169131555f6bd09529f62cbc4add9c

  • SHA512

    f6846b63e9a40f2b4cb519c1e8f2f3a761901fe218649ccaa7766b0776a367a4fe5f7276b71d2b6f12084eef727612f8785807e1e5d444828b312d078f879beb

  • SSDEEP

    196608:91Ol3enGVEnUFgLBaWo1ft1cp2xUeWbbf310eh:3OlOnGVEnUGVmfA5Pvf310C

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1276
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:976
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1336
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1632
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1096
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1408
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1876
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:732
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gepJzHQdP" /SC once /ST 18:30:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1612
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gepJzHQdP"
                  4⤵
                    PID:1364
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gepJzHQdP"
                    4⤵
                      PID:2044
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bdgVPSIBMXnLzIkafb" /SC once /ST 20:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\DqHUxWxWZRUkhfJgL\ZoWBWsVxzERycRb\nOqAeEX.exe\" 50 /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1056
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {26CF098E-2564-4652-AFCF-316FFAAECD7B} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
                1⤵
                  PID:1804
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1988
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:528
                  • C:\Windows\system32\gpscript.exe
                    gpscript.exe /RefreshSystemParam
                    1⤵
                      PID:1884
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {551063D6-E1D3-4F1A-B3E8-7C8091B69FEC} S-1-5-18:NT AUTHORITY\System:Service:
                      1⤵
                        PID:1092

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • C:\Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • C:\Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • C:\Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • \Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • \Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • \Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • \Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe

                        Filesize

                        6.2MB

                        MD5

                        f884119a6502d39a4bcec47ad87fb15d

                        SHA1

                        99fa5cc36ebe3cd908c363042c7e395a50c7ded1

                        SHA256

                        7cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770

                        SHA512

                        ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381

                      • \Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • \Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • \Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • \Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe

                        Filesize

                        6.7MB

                        MD5

                        44e8ebce6ceebb62ef6df808272f2512

                        SHA1

                        066252719556f1e28546695b7e82edde87f438bd

                        SHA256

                        8097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282

                        SHA512

                        efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69

                      • memory/556-71-0x0000000010000000-0x000000001066C000-memory.dmp

                        Filesize

                        6.4MB

                      • memory/1776-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

                        Filesize

                        8KB

                      • memory/1988-95-0x000007FEFB5F1000-0x000007FEFB5F3000-memory.dmp

                        Filesize

                        8KB

                      • memory/1988-96-0x000007FEF3810000-0x000007FEF4233000-memory.dmp

                        Filesize

                        10.1MB

                      • memory/1988-98-0x00000000024E4000-0x00000000024E7000-memory.dmp

                        Filesize

                        12KB

                      • memory/1988-97-0x000007FEF2BF0000-0x000007FEF374D000-memory.dmp

                        Filesize

                        11.4MB

                      • memory/1988-103-0x000000001B890000-0x000000001BB8F000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/1988-106-0x00000000024EB000-0x000000000250A000-memory.dmp

                        Filesize

                        124KB

                      • memory/1988-105-0x00000000024E4000-0x00000000024E7000-memory.dmp

                        Filesize

                        12KB