Resubmissions

23-02-2023 13:58

230223-q979csga63 10

23-02-2023 13:58

230223-q91vaaga59 3

30-01-2023 00:58

230130-bbgw7adb9t 10

15-01-2023 07:31

230115-jcmg3abg69 10

15-01-2023 07:28

230115-jarn1aff51 3

15-01-2023 01:34

230115-by7fcscb6w 10

Analysis

  • max time kernel
    577s
  • max time network
    608s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2023 07:31

General

  • Target

    working_attack.7z

  • Size

    925KB

  • MD5

    79c2ac9fb282708c97b2622b1dcf8428

  • SHA1

    bbfeb1b3a9379ca5fd894b8c5afa0b95f5eef1b7

  • SHA256

    db8eb8347ed084c3ee3707ad032743e350157abcaf2817e5f15777b20c554b7f

  • SHA512

    2334c5568ec148985245936d8301e8677b0d6b9809943f1c705ab80572be150d598525df205b8902f8739322f1faa42eb52087048cf57164311002a8e32d2f5f

  • SSDEEP

    24576:y7zYd9xdNsC/TbVTUGTL/g5zXCXPukSSw1hSD6xTBeJw6HXss5:ezY3bWYTUkhhSSuhS0G3s8

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\working_attack.7z
    1⤵
    • Modifies registry class
    PID:1556
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3796
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5040
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap3215:84:7zEvent3408
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1444
    • C:\Users\Admin\Desktop\working_attack\45.exe
      "C:\Users\Admin\Desktop\working_attack\45.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        2⤵
        • UAC bypass
        • Suspicious use of AdjustPrivilegeToken
        PID:1844
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SDRSVC
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4720
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:4900
    • C:\Users\Admin\Desktop\working_attack\45.exe
      "C:\Users\Admin\Desktop\working_attack\45.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
    • C:\Users\Admin\Desktop\working_attack\45.exe
      "C:\Users\Admin\Desktop\working_attack\45.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3980
    • C:\Windows\system32\mmc.exe
      "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s
      1⤵
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:900

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

      Filesize

      8KB

      MD5

      cec171cfa1ddf6d8d2447fd6f387d9e6

      SHA1

      900b80fbf94dc389b0c3c98654065bbf6aa2e1f8

      SHA256

      23c330a45b20a2cab1f99ef11d0413a7e71cad4748bf2424d1c5942aaad29df3

      SHA512

      bc3fc9b16479991520b388bf44809c5311953bbca25a52b757de2479ce292768353bebc8082aa99ee2d921fd104c172b79dc8ec4f5045f15ef161def4455e619

    • C:\Users\Admin\Desktop\working_attack\45.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\Desktop\working_attack\45.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\Desktop\working_attack\45.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\Desktop\working_attack\45.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\Desktop\working_attack\S.a3x

      Filesize

      1.5MB

      MD5

      536073c3748e4eb7bbee303547b7227d

      SHA1

      4397b1d855e799f4d38467a848cda2273c1c6c73

      SHA256

      8e289b8dfc7e4994d808ef79a88adb513365177604fe587f6efa812f284e21a3

      SHA512

      3b1e1c853c362770a4ddcc4c7b3b932f9adf9db006bf649266a1b0c9c6c7b0afb7f0cd5687f672ed58908c9af8b56a830888b6f30defb97297cbde8de18f7651

    • memory/900-155-0x00007FFFEA320000-0x00007FFFEADE1000-memory.dmp

      Filesize

      10.8MB

    • memory/900-154-0x00007FFFEA320000-0x00007FFFEADE1000-memory.dmp

      Filesize

      10.8MB

    • memory/1844-143-0x0000000006FD0000-0x00000000074FC000-memory.dmp

      Filesize

      5.2MB

    • memory/1844-142-0x0000000006790000-0x0000000006806000-memory.dmp

      Filesize

      472KB

    • memory/1844-141-0x00000000068D0000-0x0000000006A92000-memory.dmp

      Filesize

      1.8MB

    • memory/1844-144-0x0000000006880000-0x000000000689E000-memory.dmp

      Filesize

      120KB

    • memory/1844-140-0x0000000004EE0000-0x0000000004F46000-memory.dmp

      Filesize

      408KB

    • memory/1844-139-0x0000000004DF0000-0x0000000004E82000-memory.dmp

      Filesize

      584KB

    • memory/1844-138-0x0000000005490000-0x0000000005A34000-memory.dmp

      Filesize

      5.6MB

    • memory/1844-136-0x0000000000720000-0x00000000007C6000-memory.dmp

      Filesize

      664KB

    • memory/3564-148-0x0000000000350000-0x00000000003F6000-memory.dmp

      Filesize

      664KB

    • memory/3980-152-0x00000000013A0000-0x0000000001446000-memory.dmp

      Filesize

      664KB