Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2023 12:00

General

  • Target

    tmp.exe

  • Size

    3.7MB

  • MD5

    92869e94c71833c72b431746f234df5d

  • SHA1

    ba100de55cb7b04a6e39e391942b28a31bd3bd00

  • SHA256

    67cfdfdb26f8a2ad408fa8e56b8871bbf4657657ef0c263856edaf129378df18

  • SHA512

    12add3273ca7e14763f46f90b94c90f7be524d117b657784b6a87f928615a251193de1401be42bdd06c4af3192ce270d8ec766aaf9cbc9e9733e2c371d059f80

  • SSDEEP

    98304:1C6bC1J7itJ72IsqMjUB/ynP24vUvO1ReneFnZ2+n+WOYtGQk:xkAKPRgo9cQk

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 3 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingTooIklt\IntelPaint9.1.7.5." /TR "C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe" /SC MINUTE
      2⤵
      • Creates scheduled task(s)
      PID:4696
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:1324
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:2940
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "admin:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:4312
  • C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe
    C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:2944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe

    Filesize

    1076.1MB

    MD5

    093f981cff75a94b9c44589107c6f63f

    SHA1

    3c0492d2686ffd11effcab38f40047bcc187ed09

    SHA256

    5ee6fd2cc214fe52745e72f6569f41b314403a507470e9a6aa5ce6eb3774209c

    SHA512

    0edc7e25d442e305d05707cc47d0e5d87a5784dc48909ced9499156e8d5774e0b881606b1d0f297c73b713b87e5f9432349b45620a965177274e9a52d7d91d87

  • C:\ProgramData\MsiBoost\WindowsPaint-Ver9.1.7.5.exe

    Filesize

    1046.7MB

    MD5

    832e7641b24ce7c6f534d426f392cbff

    SHA1

    77d5c434ec5e8dd00c7cdee2daf87ddd73fa9bb2

    SHA256

    216448dabf39b7b48e1964977149538b4ba724c9b9ccd5a78bbe8e0abfc55828

    SHA512

    218c1daa401f544f5d5323488e797aacd5df5bf86845264dc351e52a2304822c14e991142b395a0c0d0996ed75ca132ba817550e0a045e7a78ee5a953dc5868e

  • memory/444-141-0x00000000003C0000-0x0000000000770000-memory.dmp

    Filesize

    3.7MB

  • memory/444-133-0x00000000003C0000-0x0000000000770000-memory.dmp

    Filesize

    3.7MB

  • memory/444-134-0x00000000003C0000-0x0000000000770000-memory.dmp

    Filesize

    3.7MB

  • memory/444-136-0x00000000003C0000-0x0000000000770000-memory.dmp

    Filesize

    3.7MB

  • memory/444-132-0x00000000003C0000-0x0000000000770000-memory.dmp

    Filesize

    3.7MB

  • memory/2944-143-0x0000000000610000-0x00000000009C0000-memory.dmp

    Filesize

    3.7MB

  • memory/2944-144-0x0000000000610000-0x00000000009C0000-memory.dmp

    Filesize

    3.7MB

  • memory/2944-145-0x0000000000610000-0x00000000009C0000-memory.dmp

    Filesize

    3.7MB

  • memory/2944-146-0x0000000000610000-0x00000000009C0000-memory.dmp

    Filesize

    3.7MB