Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 06:07

General

  • Target

    4379fa3f3fce655a845e8f9b9eea228fb02bbdf187b20ace0f35fdd7bee25903.exe

  • Size

    4.0MB

  • MD5

    e3909e59695938f07d3e20576bbff2ae

  • SHA1

    40d89d2f9643af919efa9c8218d43c368d60a514

  • SHA256

    4379fa3f3fce655a845e8f9b9eea228fb02bbdf187b20ace0f35fdd7bee25903

  • SHA512

    d62759546d7950b43afa0dcb539ccdebaa6abfd97d7e1db893cd56dfb1a820155fe1bd9bbbd342fea3b2b6a11bfa0eb320b5c9df98ffb09bb9685f4801a8060e

  • SSDEEP

    98304:/9eaUjNM4oAVF8A1k9nPArfcdO2ingPKSUNSeu:/9nHGCGsGfcsFngPnUs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Stops running service(s) 3 TTPs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4379fa3f3fce655a845e8f9b9eea228fb02bbdf187b20ace0f35fdd7bee25903.exe
    "C:\Users\Admin\AppData\Local\Temp\4379fa3f3fce655a845e8f9b9eea228fb02bbdf187b20ace0f35fdd7bee25903.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\OTE.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
      2⤵
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:4188
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im coiome.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im coiome.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1280
    • C:\Program Files (x86)\Common Files\sgcscvy\coiome.exe
      "C:\Program Files (x86)\Common Files\sgcscvy\coiome.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc delete JavaServe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\SysWOW64\sc.exe
          sc delete JavaServe
          4⤵
          • Launches sc.exe
          PID:3260
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c taskkill /im iejore.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im iejore.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c taskkill /im conime.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im conime.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc stop LYTC
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\SysWOW64\sc.exe
          sc stop LYTC
          4⤵
          • Launches sc.exe
          PID:4140
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc stop Messenger
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:420
        • C:\Windows\SysWOW64\sc.exe
          sc stop Messenger
          4⤵
          • Launches sc.exe
          PID:4048
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc delete Messenger
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Windows\SysWOW64\sc.exe
          sc delete Messenger
          4⤵
          • Launches sc.exe
          PID:2804
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc delete LYTC
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\SysWOW64\sc.exe
          sc delete LYTC
          4⤵
          • Launches sc.exe
          PID:2420
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc stop IE_WinserverName
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Windows\SysWOW64\sc.exe
          sc stop IE_WinserverName
          4⤵
          • Launches sc.exe
          PID:4356
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc delete IE_WinserverName
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\SysWOW64\sc.exe
          sc delete IE_WinserverName
          4⤵
          • Launches sc.exe
          PID:2904
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc stop HidServ
        3⤵
          PID:1912
          • C:\Windows\SysWOW64\sc.exe
            sc stop HidServ
            4⤵
            • Launches sc.exe
            PID:5000
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c sc delete HidServ
          3⤵
            PID:1256
            • C:\Windows\SysWOW64\sc.exe
              sc delete HidServ
              4⤵
              • Launches sc.exe
              PID:1192
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c cacls "C:\Documents and Settings\All Users\Application Data\Storm\update" /e /p everyone:n
            3⤵
              PID:3904
              • C:\Windows\SysWOW64\cacls.exe
                cacls "C:\Documents and Settings\All Users\Application Data\Storm\update" /e /p everyone:n
                4⤵
                  PID:3736
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c cacls "C:\Program Files\Common Files\Microsoft Shared\MSInfo" /e /p everyone:n
                3⤵
                  PID:2412
                  • C:\Windows\SysWOW64\cacls.exe
                    cacls "C:\Program Files\Common Files\Microsoft Shared\MSInfo" /e /p everyone:n
                    4⤵
                      PID:4328
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c del "C:\Users\Admin\AppData\Local\Temp\4379fa3f3fce655a845e8f9b9eea228fb02bbdf187b20ace0f35fdd7bee25903.exe"
                  2⤵
                    PID:4220

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Common Files\sgcscvy\coiome.exe

                  Filesize

                  8.0MB

                  MD5

                  9b674ee79aabd5de9601ee0f5e0508d7

                  SHA1

                  a444bfa87de7260f679580d318d18faed92fe262

                  SHA256

                  58daeb69a6e7393090357f210b4a320058c9b6e8d025d0fc5eba9f91659004d4

                  SHA512

                  ae0f547c0aef9bd23d330748cce8c526fa656e307bd386a2eca9b0fce2c748d3b9b5c03cc8f8051c5faf3b00ec3cdbb6a480405fb886580cdfe6b2744bf1e791

                • C:\Program Files (x86)\Common Files\sgcscvy\coiome.exe

                  Filesize

                  8.0MB

                  MD5

                  9b674ee79aabd5de9601ee0f5e0508d7

                  SHA1

                  a444bfa87de7260f679580d318d18faed92fe262

                  SHA256

                  58daeb69a6e7393090357f210b4a320058c9b6e8d025d0fc5eba9f91659004d4

                  SHA512

                  ae0f547c0aef9bd23d330748cce8c526fa656e307bd386a2eca9b0fce2c748d3b9b5c03cc8f8051c5faf3b00ec3cdbb6a480405fb886580cdfe6b2744bf1e791

                • C:\Program Files (x86)\OTE.hta

                  Filesize

                  780B

                  MD5

                  439e3753d54e5bb10bbacae5d707d2bc

                  SHA1

                  4a66f505f560db1c896fd1b65309ddc1befdd27f

                  SHA256

                  db72cdc20e0fd6377d92873dcdf739968780ef4f1fa4e2401f18ef84829fd9b2

                  SHA512

                  5697558df2ce7151dccd7393ca66aac544ba767fa6875cfed8629b38d3efa56aef4073395d48e6bb38eedcdd42ff5bdae4f7974f709e26b6f4d55131390f89f7

                • memory/1164-141-0x0000000000400000-0x0000000000413000-memory.dmp

                  Filesize

                  76KB

                • memory/1164-140-0x0000000000400000-0x0000000000413000-memory.dmp

                  Filesize

                  76KB

                • memory/1688-132-0x0000000000400000-0x0000000000413000-memory.dmp

                  Filesize

                  76KB