Analysis

  • max time kernel
    108s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2023, 09:22

General

  • Target

    804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe

  • Size

    5.7MB

  • MD5

    0b58bcd32bc93b428e389f8976665749

  • SHA1

    8e7d64a9d31d71ca9048cb1a52893ab763869153

  • SHA256

    804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542

  • SHA512

    fb8aadc29d76a0b03b417560b885c90767752dc7d8c3fc289bc76f14d54240c90d0779ee2ca1846cf69750085896cfa6711e4bcc5bdacab024df7b4a59255a2f

  • SSDEEP

    98304:I0LLudgk03bPi/IIZKySE89KUXPf8L5gaXjelb4e+LfvfyW8A/:I0cg53b6/ImKRHnoKHl/2d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe
    "C:\Users\Admin\AppData\Local\Temp\804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingTooIklt\IntelPaint2.0.1.8." /TR "C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe" /SC MINUTE
      2⤵
      • Creates scheduled task(s)
      PID:4684
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:4936
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:3152
    • C:\Windows\System32\icacls.exe
      "C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "admin:(R,REA,RA,RD)"
      2⤵
      • Modifies file permissions
      PID:872
  • C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe
    C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe
    1⤵
    • Executes dropped EXE
    PID:3980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe

    Filesize

    568.8MB

    MD5

    02281127a2516e07ae1e5916e2b2a415

    SHA1

    4e8a23ecdc6215134be708996e3b35e0facea11c

    SHA256

    ff7398da090885fd0e0e8c59bb2339c354a0dc2ca715aba86aa9d9a04e5bfa9f

    SHA512

    372c04345ecbe405dad3626b2f91cfb1be438b39a869c1a4740de22bc29a42deb1cb7eee998269fe0f5ea4c08d5b2e947908c716dad5451ed025e612e115333a

  • C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe

    Filesize

    568.8MB

    MD5

    02281127a2516e07ae1e5916e2b2a415

    SHA1

    4e8a23ecdc6215134be708996e3b35e0facea11c

    SHA256

    ff7398da090885fd0e0e8c59bb2339c354a0dc2ca715aba86aa9d9a04e5bfa9f

    SHA512

    372c04345ecbe405dad3626b2f91cfb1be438b39a869c1a4740de22bc29a42deb1cb7eee998269fe0f5ea4c08d5b2e947908c716dad5451ed025e612e115333a

  • memory/3980-141-0x00007FF69ABC0000-0x00007FF69B4C3000-memory.dmp

    Filesize

    9.0MB

  • memory/4740-132-0x00007FF7F9AC0000-0x00007FF7FA3C3000-memory.dmp

    Filesize

    9.0MB