Analysis

  • max time kernel
    336s
  • max time network
    363s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 17:52

General

  • Target

    f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe

  • Size

    407KB

  • MD5

    9239e490e9c53e2836a2b5036b8c2799

  • SHA1

    63d0b7ec9f6299b59c0facaacc9ee22bddac9539

  • SHA256

    f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

  • SHA512

    c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

  • SSDEEP

    6144:w7eGar3Vjb57Yc1OwrjnU6s0sQkWRxSAMO8Wqhhy6JdMMrYIEadcM:wippbtb7a0zkbg8Wqhh7prcadn

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
    "C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
      "C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
        C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4888
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4592
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f
            5⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:1136
        • C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
          C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
            C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
            5⤵
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            PID:4836
            • C:\Windows\apocalyps32.exe
              -bs
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1300
              • C:\Windows\apocalyps32.exe
                "C:\Windows\apocalyps32.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4352
                • C:\Windows\apocalyps32.exe
                  C:\Windows\apocalyps32.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3400
                  • C:\Windows\apocalyps32.exe
                    C:\Windows\apocalyps32.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:4816
                    • C:\Windows\apocalyps32.exe
                      C:\Windows\apocalyps32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      PID:2404
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                        11⤵
                          PID:448
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2800
    • C:\Windows\SysWOW64\reg.exe
      REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f
      1⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:3560

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • C:\Windows\apocalyps32.exe

      Filesize

      407KB

      MD5

      9239e490e9c53e2836a2b5036b8c2799

      SHA1

      63d0b7ec9f6299b59c0facaacc9ee22bddac9539

      SHA256

      f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499

      SHA512

      c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235

    • memory/1136-164-0x0000000000000000-mapping.dmp

    • memory/1300-176-0x0000000000620000-0x0000000000630000-memory.dmp

      Filesize

      64KB

    • memory/1300-180-0x0000000000660000-0x0000000000670000-memory.dmp

      Filesize

      64KB

    • memory/1300-175-0x0000000000610000-0x0000000000620000-memory.dmp

      Filesize

      64KB

    • memory/1300-172-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/1300-173-0x00000000005F0000-0x0000000000600000-memory.dmp

      Filesize

      64KB

    • memory/1300-186-0x0000000000400000-0x0000000000466400-memory.dmp

      Filesize

      409KB

    • memory/1300-174-0x0000000000600000-0x0000000000610000-memory.dmp

      Filesize

      64KB

    • memory/1300-179-0x0000000000650000-0x0000000000660000-memory.dmp

      Filesize

      64KB

    • memory/1300-178-0x0000000000640000-0x0000000000650000-memory.dmp

      Filesize

      64KB

    • memory/1300-177-0x0000000000630000-0x0000000000640000-memory.dmp

      Filesize

      64KB

    • memory/1300-168-0x0000000000000000-mapping.dmp

    • memory/2404-205-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2404-207-0x0000000040010000-0x000000004004B000-memory.dmp

      Filesize

      236KB

    • memory/2404-199-0x0000000000000000-mapping.dmp

    • memory/2404-210-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2528-132-0x0000000000400000-0x0000000000466400-memory.dmp

      Filesize

      409KB

    • memory/2528-138-0x0000000002400000-0x0000000002410000-memory.dmp

      Filesize

      64KB

    • memory/2528-134-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/2528-133-0x00000000006D0000-0x00000000006E0000-memory.dmp

      Filesize

      64KB

    • memory/2528-135-0x00000000023D0000-0x00000000023E0000-memory.dmp

      Filesize

      64KB

    • memory/2528-147-0x0000000000400000-0x0000000000466400-memory.dmp

      Filesize

      409KB

    • memory/2528-136-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/2528-141-0x0000000002440000-0x0000000002450000-memory.dmp

      Filesize

      64KB

    • memory/2528-137-0x00000000023F0000-0x0000000002400000-memory.dmp

      Filesize

      64KB

    • memory/2528-140-0x0000000002430000-0x0000000002440000-memory.dmp

      Filesize

      64KB

    • memory/2528-139-0x0000000002410000-0x0000000002420000-memory.dmp

      Filesize

      64KB

    • memory/2800-154-0x0000000000000000-mapping.dmp

    • memory/3120-165-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3120-159-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3120-155-0x0000000000000000-mapping.dmp

    • memory/3120-156-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3400-197-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/3400-187-0x0000000000000000-mapping.dmp

    • memory/3560-160-0x0000000000000000-mapping.dmp

    • memory/3632-151-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3632-146-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3632-145-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3632-143-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3632-142-0x0000000000000000-mapping.dmp

    • memory/4352-189-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4352-181-0x0000000000000000-mapping.dmp

    • memory/4592-153-0x0000000000000000-mapping.dmp

    • memory/4816-193-0x0000000000000000-mapping.dmp

    • memory/4816-202-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4836-163-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4836-171-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4836-167-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4836-162-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4836-166-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4836-161-0x0000000000000000-mapping.dmp

    • memory/4888-158-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/4888-152-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/4888-149-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/4888-148-0x0000000000000000-mapping.dmp