Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 18:14

General

  • Target

    917ee0b5334ea1866a33571a5ca7c01a77e3f95a0ac6b8a24a3afd655f65a45d.exe

  • Size

    383KB

  • MD5

    15a53828f4f16193bd605eb648508ae0

  • SHA1

    23f7aa1a7770100d24089ac10c24ce16d370065a

  • SHA256

    917ee0b5334ea1866a33571a5ca7c01a77e3f95a0ac6b8a24a3afd655f65a45d

  • SHA512

    2c02d70e2ee2686d807e2296c38e1a285ec41c0891387ce4446ebcce9602d92410006fad9311d77760516d92e7f8ec4c5768b4ee5f8b0ab11d368c807ca2a60c

  • SSDEEP

    3072:Tyx2XSyL7OZsvxQT7+WdzfJZWq6VbSe/tZw69Mt56Id8Kmc:TycgZsvxQT7+fq6VI6Cp

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 5 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917ee0b5334ea1866a33571a5ca7c01a77e3f95a0ac6b8a24a3afd655f65a45d.exe
    "C:\Users\Admin\AppData\Local\Temp\917ee0b5334ea1866a33571a5ca7c01a77e3f95a0ac6b8a24a3afd655f65a45d.exe"
    1⤵
    • Drops file in Program Files directory
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\PROGRA~1\COMMON~1\System\coloraco.exe
      C:\PROGRA~1\COMMON~1\System\coloraco.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Sets service image path in registry
      • Adds Run key to start application
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1756
    • C:\PROGRA~1\COMMON~1\MICROS~1\ink\cs-CZ\comppkco.exe
      C:\PROGRA~1\COMMON~1\MICROS~1\ink\cs-CZ\comppkco.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5096

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~1\COMMON~1\MICROS~1\ink\cs-CZ\comppkco.exe

          Filesize

          377KB

          MD5

          d1b89ee4534279b038722e6a30f52b42

          SHA1

          4bbde698ce2b384539b96924dde81a7cd0c73017

          SHA256

          a28244024cb9e472070f1d642834a9b9ac24d9b083bb166dcbd43e30661c7940

          SHA512

          af728dc67395301e5317a2496937d74c01ae91cefe808779689d456bf0859d852f9e8ba28c745294b36cf7585a580cf9f69f97708a49ed2217c9c14eab285f26

        • C:\PROGRA~1\COMMON~1\System\coloraco.exe

          Filesize

          377KB

          MD5

          8ae1680f3c11a0ad39acf5f95afaeafe

          SHA1

          89aa3e30c7fcf5e3c695c8e19fa1dde33d05dadb

          SHA256

          ede5914e39bede77ded9ffe893ac56eaed8851aaea5f5a0f10f79597db45804a

          SHA512

          05ebb03e44ef35ddeceb36ffd93ad83d2d2a17f3ad78ee558de25a3b8d995534a0e3d3fcf6d7513f3abc7d0716ac3018b8a232f44eddd7023798174a06042e06

        • C:\Program Files\Common Files\System\coloraco.exe

          Filesize

          377KB

          MD5

          8ae1680f3c11a0ad39acf5f95afaeafe

          SHA1

          89aa3e30c7fcf5e3c695c8e19fa1dde33d05dadb

          SHA256

          ede5914e39bede77ded9ffe893ac56eaed8851aaea5f5a0f10f79597db45804a

          SHA512

          05ebb03e44ef35ddeceb36ffd93ad83d2d2a17f3ad78ee558de25a3b8d995534a0e3d3fcf6d7513f3abc7d0716ac3018b8a232f44eddd7023798174a06042e06

        • C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\comppkco.exe

          Filesize

          377KB

          MD5

          d1b89ee4534279b038722e6a30f52b42

          SHA1

          4bbde698ce2b384539b96924dde81a7cd0c73017

          SHA256

          a28244024cb9e472070f1d642834a9b9ac24d9b083bb166dcbd43e30661c7940

          SHA512

          af728dc67395301e5317a2496937d74c01ae91cefe808779689d456bf0859d852f9e8ba28c745294b36cf7585a580cf9f69f97708a49ed2217c9c14eab285f26

        • memory/1756-139-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/1756-148-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/1808-134-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/1808-146-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/5096-147-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/5096-149-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB