Analysis

  • max time kernel
    163s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 07:18

General

  • Target

    f0546b3ff09bea4b1a3cb26b11136a3388a217920163b374f48bff1b8713661f.exe

  • Size

    545KB

  • MD5

    ceaf4e60f927a7e2096803904ff354dc

  • SHA1

    90b4df8884b76d67db41403d2c66a67f69c26091

  • SHA256

    f0546b3ff09bea4b1a3cb26b11136a3388a217920163b374f48bff1b8713661f

  • SHA512

    de2fb4b27d39f96031624f784f4ff6811f0ee7357c033951a815e6124dd439608e83ceb13566d41180c945f63a9e6bd6483408f9532a7ab2f56c3a0e6613000a

  • SSDEEP

    12288:XGgt068RPhxGnKro1xepVyyiwMg1FKCd3EPwSbCJXxEhcWNSraaWh:VS9RPhxGngeFyiwM40PnCJXxEdu3A

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 57 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0546b3ff09bea4b1a3cb26b11136a3388a217920163b374f48bff1b8713661f.exe
    "C:\Users\Admin\AppData\Local\Temp\f0546b3ff09bea4b1a3cb26b11136a3388a217920163b374f48bff1b8713661f.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c regedit /s "C:\WINDOWS\system32\????.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s "C:\WINDOWS\system32\????.reg"
        3⤵
        • Runs .reg file with regedit
        PID:4320
    • C:\WINDOWS\SysWOW64\run.exe
      C:\WINDOWS\system32\run.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\WINDOWS\SysWOW64\cmd.exe
        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt1145.bat C:\WINDOWS\system32\run.exe
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3292
        • C:\Windows\SysWOW64\sc.exe
          sc config srservice start= DISABLED
          4⤵
          • Launches sc.exe
          PID:4568
        • C:\Windows\SysWOW64\sc.exe
          sc config wuauserv start= DEMAND
          4⤵
          • Launches sc.exe
          PID:4648
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318} | findstr "}\\{"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4680
          • C:\Windows\SysWOW64\reg.exe
            reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}
            5⤵
              PID:1404
            • C:\Windows\SysWOW64\findstr.exe
              findstr "}\\{"
              5⤵
                PID:4564
            • C:\Windows\SysWOW64\reg.exe
              reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\{07374750-E68B-490E-9330-9FD785CD71B6}\Connection /v IpCheckingEnabled /t REG_DWORD /d 0 /f
              4⤵
                PID:204
              • C:\Windows\SysWOW64\mmc.exe
                "C:\Windows\system32\mmc.exe" "C:\WINDOWS\system32\devmgmt.msc"
                4⤵
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4372
                • C:\Windows\system32\mmc.exe
                  "C:\WINDOWS\system32\devmgmt.msc" "C:\WINDOWS\system32\devmgmt.msc"
                  5⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:4068

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bt1145.bat

          Filesize

          1KB

          MD5

          0954fd607cc796e06b1277ef7ef334b3

          SHA1

          d6b3cfcf345d03ea4c984ba4f259acd13cc24deb

          SHA256

          97f6a06e54b947a90375b61d469a3785c356266ae5bde438e313989383d5466a

          SHA512

          4db0fa0e86998b4319ebe8dc466c158a9e6baf102f33f720fb5a794daf30214f3b63ff3c7a62d5690dbad220ee2e03762f8f67650f1d042757cd620b1b025886

        • C:\WINDOWS\SysWOW64\run.exe

          Filesize

          147KB

          MD5

          ca0654649f0aa19ba7f89d5fd4c64271

          SHA1

          98422bd3bc3da7c5190c2b156b967779b6183632

          SHA256

          fb0c456440758ce3efd40a73616f8ac0d2ff6d4a6d14d150ae996f30a38ffee4

          SHA512

          ba6083ea336c4516b7d46c953382e7ff95199577f20ae3645dbd1e1705bbe2aafb777e30a61cc36aece4eac3292e7e81344733622e1628fd257d17f0021a2db8

        • C:\Windows\SysWOW64\run.exe

          Filesize

          147KB

          MD5

          ca0654649f0aa19ba7f89d5fd4c64271

          SHA1

          98422bd3bc3da7c5190c2b156b967779b6183632

          SHA256

          fb0c456440758ce3efd40a73616f8ac0d2ff6d4a6d14d150ae996f30a38ffee4

          SHA512

          ba6083ea336c4516b7d46c953382e7ff95199577f20ae3645dbd1e1705bbe2aafb777e30a61cc36aece4eac3292e7e81344733622e1628fd257d17f0021a2db8

        • memory/952-132-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/952-148-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB