Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 10:15

General

  • Target

    c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe

  • Size

    743KB

  • MD5

    b6e08a65972c4023436c14a359fe73af

  • SHA1

    611847af498d29c8e2404fc7124c994c5f4085b1

  • SHA256

    c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01

  • SHA512

    569d9d02fb73d3637e35f52939436a14d09818431f7663526d6c5f08792a8390da631d64f59ddac08b53f984fc326da3431b73470a5642e5a0cbf7a686527df3

  • SSDEEP

    12288:LczJJhqrVPllvKspPT3GWGqWKNiTic4RVavipq2i3e3eRYSLuzq:LczJKVdD3GzqWTec4RcEq2i3euR/uzq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Possible privilege escalation attempt 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 8 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe
    "C:\Users\Admin\AppData\Local\Temp\c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\A.I.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Run.cmd" "
        3⤵
        • Deletes itself
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\SysWOW64\reg.exe
          REG QUERY "HKLM\SOFTWARE\Microsoft\Office\14.0" /s
          4⤵
            PID:1872
          • C:\Windows\SysWOW64\regedt32.exe
            C:\Windows\System32\regedt32.exe /s Server.reg
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:268
            • C:\Windows\SysWOW64\regedit.exe
              "C:\Windows\regedit.exe" /s Server.reg
              5⤵
              • Runs .reg file with regedit
              PID:936
          • C:\Windows\system32\regedt32.exe
            C:\Windows\Sysnative\regedt32.exe /s Server.reg
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Windows\regedit.exe
              "C:\Windows\regedit.exe" /s Server.reg
              5⤵
              • Runs .reg file with regedit
              PID:344
          • C:\Windows\SysWOW64\takeown.exe
            takeown /F C:\Windows\System32\rundll32.exe
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:1764
          • C:\Windows\SysWOW64\icacls.exe
            icacls C:\Windows\System32\rundll32.exe /deny everyone:F
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:576
          • C:\Windows\SysWOW64\takeown.exe
            takeown /F C:\Windows\Sysnative\rundll32.exe
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:928
          • C:\Windows\SysWOW64\icacls.exe
            icacls C:\Windows\Sysnative\rundll32.exe /deny everyone:F
            4⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:564
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Server.exe
            Server.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1028
            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe"
              5⤵
              • Executes dropped EXE
              PID:1760
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\install.cmd" "
                6⤵
                • Loads dropped DLL
                PID:600
                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exe
                  KmsServer.exe
                  7⤵
                  • Executes dropped EXE
                  PID:1792
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2 /nobreak
            4⤵
            • Delays execution with timeout.exe
            PID:1532
          • C:\Windows\SysWOW64\cscript.exe
            cscript ospp.vbs /act
            4⤵
              PID:1812
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K oc.cmd
              4⤵
                PID:940
                • C:\Windows\SysWOW64\cscript.exe
                  cscript //nologo ospp.vbs /dstatus
                  5⤵
                    PID:1848
                • C:\Windows\SysWOW64\takeown.exe
                  takeown /F C:\Windows\System32\rundll32.exe
                  4⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:812
                • C:\Windows\SysWOW64\icacls.exe
                  icacls C:\Windows\System32\rundll32.exe /grant everyone:F
                  4⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:936
                • C:\Windows\SysWOW64\takeown.exe
                  takeown /F C:\Windows\Sysnative\rundll32.exe
                  4⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:892
                • C:\Windows\SysWOW64\icacls.exe
                  icacls C:\Windows\Sysnative\rundll32.exe /grant everyone:F
                  4⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:1144
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im KmsServer.exe
                  4⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1516
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 2 /nobreak
                  4⤵
                  • Delays execution with timeout.exe
                  PID:1756

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\A.I.vbs

            Filesize

            142B

            MD5

            caa3eb92c5d0044698cb72ea699f5022

            SHA1

            19b81006722a84395a9ee1486494a050ddf4dd0f

            SHA256

            5d9fd4c0364235e54a490a79f482dcc6e61d6ea7092e7dcfd53434df8b11e9d2

            SHA512

            93960758183eeecbe5fb1cb3b9448b51169444d6e42e1e66427362e430b1622d366f5b9e670487bd4ebefe9d540e74882b4c8847e7cff23374fbc57e1adbdddd

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Run.cmd

            Filesize

            2KB

            MD5

            ebfcb3f32c9120834f5b343c943028ee

            SHA1

            b010ae7589b2f61c3f186ecb17fece2823a1df7c

            SHA256

            9a318489ebad778d06dcfc2fdf9e17a95f005d30c25e07f05f6694cd08bec341

            SHA512

            8a575790b5aaf668ba3b2a5028331a70948f063b3f08c3cede6da590a017b24371613192cabd08ef12a884c03222f1f8e338994080b2fba920a13edfe9774bbf

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Server.exe

            Filesize

            412KB

            MD5

            bf577094d53599f1ae46fdc409ccc9ff

            SHA1

            53a45bf84e66ddb51fe99b6dd8acd25ee1e4c718

            SHA256

            e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d

            SHA512

            3234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Server.exe

            Filesize

            412KB

            MD5

            bf577094d53599f1ae46fdc409ccc9ff

            SHA1

            53a45bf84e66ddb51fe99b6dd8acd25ee1e4c718

            SHA256

            e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d

            SHA512

            3234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Server.reg

            Filesize

            314B

            MD5

            91dc95a38d11701bcce847af2833e325

            SHA1

            6c78dc43ada507c8649177dbbee65c76f408d1a0

            SHA256

            abbabbd757aab5953be79b4ad2279eabfb7ee09dd7bc88a39cca01452d982ec2

            SHA512

            cbeba9ceda31cad1cc85d038b854b1c5c0f61e20d1d5f94f3c79ea67d279a30942fbdd32eb5a11f56336301e691b0a64389eacbaf74b4e5204f4c1b12617a116

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\oc.cmd

            Filesize

            101B

            MD5

            885d3dbca690177ab9c86c04736e02a6

            SHA1

            70906e97cd79011a449fede2448eaa91dee020de

            SHA256

            a950c4894ab269be4913149c3228f773fbce10a175e2a76b13482f263b8d89a4

            SHA512

            8209018e0925736984b1a228407ea2cde2c1dc9e54de23cc1998f16c55df3e91a0780641563ea3484a785cbd9d1b0b64696bbac25e6a0a50e74a23a0bf95d5d5

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\oga.dll

            Filesize

            651KB

            MD5

            964a4192ffb663b98ec612c69fb7b4bd

            SHA1

            bb9aec8dda35818a7d7b24ac9751c8c881a64cde

            SHA256

            69ceb118bcbadb2b828855db26d53bc4cbb3b6c26b482ac9d0d947a3d3045eaf

            SHA512

            1486237ba86fc01390b4c5cd58bf62795f0ef96f9cce524d1d62b76120700fa96cdd374897753fd847ec7b20019c28486119d667d6b71dd2f7a9e1405f60da68

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ospp.vbs

            Filesize

            48KB

            MD5

            572e9a87757ac96c7677fd1b1b113c55

            SHA1

            9c8b96971997cd2dc0ed14f19dd9bc56d3348c3a

            SHA256

            008cf05944053116a095ad466561d3fd4be8a7de79e5ada7c5daab492f730465

            SHA512

            bf670754942cfa839de4a31676a3ba2ac8cd1a00de6f1b70aff995e14a9c489e996e9a019898ec3470a11d02c14ab7a8fe4855a8f028d6b4ea987e51411d7be3

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\slerror.xml

            Filesize

            32KB

            MD5

            df1ef05879e06c5f09f3e1022f37b5cb

            SHA1

            23aaac40baec28397bb59cfa584e165062d18506

            SHA256

            d49adf2dabbbf6aa43ce4e336af4f768207df75302ebf568a94a5350aac988c5

            SHA512

            78f0d21538483d3bac9d8b409554ac89a98a4943666f0ff88207831ab3e1d264c2efa0ea0e4703375aa15516809353f9b7477561a0a4ffe0b930b3e39f8b7e07

          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exe

            Filesize

            148KB

            MD5

            df4e58adfebda4f96de5d9a8b1a512a5

            SHA1

            5e6822206d28cee5c23e1f2d8b04d56889b0d10e

            SHA256

            09296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f

            SHA512

            90fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa

          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exe

            Filesize

            148KB

            MD5

            df4e58adfebda4f96de5d9a8b1a512a5

            SHA1

            5e6822206d28cee5c23e1f2d8b04d56889b0d10e

            SHA256

            09296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f

            SHA512

            90fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa

          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe

            Filesize

            21KB

            MD5

            f3244e8ae8b1ca3448468ef565226303

            SHA1

            8bd31269081a9a4c55e47c91c9d8d25742c90eb1

            SHA256

            dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f

            SHA512

            d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d

          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe

            Filesize

            21KB

            MD5

            f3244e8ae8b1ca3448468ef565226303

            SHA1

            8bd31269081a9a4c55e47c91c9d8d25742c90eb1

            SHA256

            dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f

            SHA512

            d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d

          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\install.cmd

            Filesize

            61B

            MD5

            78b1c04bf28a366b1095d83bb8670af5

            SHA1

            5a7df12292f8b83ad63b915bc473ea8a3339c41e

            SHA256

            0f1d6d21bfb795ec47bea8290290484684d00cdaa75c0ee10c1912d555fe8171

            SHA512

            f488d74856b11e38de441674495ca0f438e8031d7eae387b350d61eada0fec24400c0e15eee8117a5adccbdd3de19ca2bc443ee5063ae208e6a75369f4eccdb3

          • \Users\Admin\AppData\Local\Temp\RarSFX0\Server.exe

            Filesize

            412KB

            MD5

            bf577094d53599f1ae46fdc409ccc9ff

            SHA1

            53a45bf84e66ddb51fe99b6dd8acd25ee1e4c718

            SHA256

            e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d

            SHA512

            3234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52

          • \Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exe

            Filesize

            148KB

            MD5

            df4e58adfebda4f96de5d9a8b1a512a5

            SHA1

            5e6822206d28cee5c23e1f2d8b04d56889b0d10e

            SHA256

            09296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f

            SHA512

            90fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa

          • \Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exe

            Filesize

            148KB

            MD5

            df4e58adfebda4f96de5d9a8b1a512a5

            SHA1

            5e6822206d28cee5c23e1f2d8b04d56889b0d10e

            SHA256

            09296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f

            SHA512

            90fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa

          • \Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe

            Filesize

            21KB

            MD5

            f3244e8ae8b1ca3448468ef565226303

            SHA1

            8bd31269081a9a4c55e47c91c9d8d25742c90eb1

            SHA256

            dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f

            SHA512

            d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d

          • \Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe

            Filesize

            21KB

            MD5

            f3244e8ae8b1ca3448468ef565226303

            SHA1

            8bd31269081a9a4c55e47c91c9d8d25742c90eb1

            SHA256

            dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f

            SHA512

            d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d

          • memory/268-63-0x0000000000000000-mapping.dmp

          • memory/344-69-0x0000000000000000-mapping.dmp

          • memory/564-78-0x0000000000000000-mapping.dmp

          • memory/576-74-0x0000000000000000-mapping.dmp

          • memory/600-94-0x0000000000000000-mapping.dmp

          • memory/812-110-0x0000000000000000-mapping.dmp

          • memory/892-118-0x0000000000000000-mapping.dmp

          • memory/928-76-0x0000000000000000-mapping.dmp

          • memory/936-65-0x0000000000000000-mapping.dmp

          • memory/936-113-0x0000000000000000-mapping.dmp

          • memory/940-109-0x0000000000000000-mapping.dmp

          • memory/996-55-0x0000000000000000-mapping.dmp

          • memory/1028-103-0x0000000000540000-0x0000000000553000-memory.dmp

            Filesize

            76KB

          • memory/1028-104-0x0000000000540000-0x0000000000553000-memory.dmp

            Filesize

            76KB

          • memory/1028-83-0x0000000000000000-mapping.dmp

          • memory/1144-120-0x0000000000000000-mapping.dmp

          • memory/1216-59-0x0000000000000000-mapping.dmp

          • memory/1336-54-0x00000000762D1000-0x00000000762D3000-memory.dmp

            Filesize

            8KB

          • memory/1516-122-0x0000000000000000-mapping.dmp

          • memory/1532-86-0x0000000000000000-mapping.dmp

          • memory/1756-124-0x0000000000000000-mapping.dmp

          • memory/1760-101-0x0000000000400000-0x0000000000413000-memory.dmp

            Filesize

            76KB

          • memory/1760-90-0x0000000000000000-mapping.dmp

          • memory/1764-72-0x0000000000000000-mapping.dmp

          • memory/1792-99-0x0000000000000000-mapping.dmp

          • memory/1812-105-0x0000000000000000-mapping.dmp

          • memory/1848-116-0x0000000000000000-mapping.dmp

          • memory/1872-61-0x0000000000000000-mapping.dmp

          • memory/2032-68-0x000007FEFBB41000-0x000007FEFBB43000-memory.dmp

            Filesize

            8KB

          • memory/2032-66-0x0000000000000000-mapping.dmp