Analysis

  • max time kernel
    150s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2023 01:23

General

  • Target

    8fb826ea46d4e61c979ad83cf0dd684f.exe

  • Size

    1.1MB

  • MD5

    8fb826ea46d4e61c979ad83cf0dd684f

  • SHA1

    b0f417beea49fec51bb57912f9e719b4d708b22e

  • SHA256

    ee320fdb489f569b02dc934f9e5a12e66a031b3c2a4956d1b29fc4a3f3ab92ba

  • SHA512

    77b2923479a737b315d003e222bfcf0bf4d7cdc843d3ab7654c9ba87a48d34c53803d0ba18d756c9febacd0916f3f410d0d8372a51418d9b8ad2247c0f86d9d5

  • SSDEEP

    24576:W+pA7U7VqM/qVNN1zJaFWJLiuz6B/7wP4QKaYxl2e/:LB7Vq7VTVJac+zB/MPdExl2e/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 8 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fb826ea46d4e61c979ad83cf0dd684f.exe
    "C:\Users\Admin\AppData\Local\Temp\8fb826ea46d4e61c979ad83cf0dd684f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\DRESJH.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f
        3⤵
          PID:672
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          3⤵
          • UAC bypass
          PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\OBXwo.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msconfig32" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\uTsry.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "msconfig32" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Pfyia.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe, C:\Windows\msconfig32\msconfig32.exe" /f
          3⤵
          • Modifies WinLogon for persistence
          PID:1040
      • C:\Windows\msconfig32\msconfig32.exe
        "C:\Windows\msconfig32\msconfig32.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\msconfig32\msconfig32.exe
          C:\Windows\msconfig32\msconfig32.exe
          3⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
              PID:756
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                5⤵
                • Modifies firewall policy service
                • Modifies registry key
                PID:840
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\msconfig32\msconfig32.exe" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe:*:Enabled:Windows Messanger" /f
              4⤵
                PID:752
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\msconfig32\msconfig32.exe" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe:*:Enabled:Windows Messanger" /f
                  5⤵
                  • Modifies firewall policy service
                  • Modifies registry key
                  PID:2040
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                4⤵
                  PID:648
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                    5⤵
                    • Modifies firewall policy service
                    • Modifies registry key
                    PID:924
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\lsoss32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lsoss32.exe:*:Enabled:Windows Messanger" /f
                  4⤵
                    PID:672
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\lsoss32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lsoss32.exe:*:Enabled:Windows Messanger" /f
                      5⤵
                      • Modifies firewall policy service
                      • Modifies registry key
                      PID:564
                • C:\Windows\msconfig32\msconfig32.exe
                  C:\Windows\msconfig32\msconfig32.exe
                  3⤵
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1064

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\DRESJH.bat

              Filesize

              255B

              MD5

              180e420d8578c4341546b0f2676f52c5

              SHA1

              3683c541fe1ad96c37fcfa91f3d819f2c43ccf84

              SHA256

              27bad6b003d19c5063cfc49ee5828c5ebb82659ee5c89ed2df20ae1c4917ba28

              SHA512

              5bbcdd40178a399dd4e879e39328824c47edc39a040b7d1eed90368bbdab0d51d9cb187357cc3a223ed22086ff650c10f3841fc9bb50469eb9a72ca343c77ed9

            • C:\Users\Admin\AppData\Local\Temp\DRESJH.bat

              Filesize

              255B

              MD5

              180e420d8578c4341546b0f2676f52c5

              SHA1

              3683c541fe1ad96c37fcfa91f3d819f2c43ccf84

              SHA256

              27bad6b003d19c5063cfc49ee5828c5ebb82659ee5c89ed2df20ae1c4917ba28

              SHA512

              5bbcdd40178a399dd4e879e39328824c47edc39a040b7d1eed90368bbdab0d51d9cb187357cc3a223ed22086ff650c10f3841fc9bb50469eb9a72ca343c77ed9

            • C:\Users\Admin\AppData\Local\Temp\OBXwo.bat

              Filesize

              133B

              MD5

              4e99d945ca61ed0b261a73d985f5420e

              SHA1

              ce08b5c3939572703ae753bfa72c0224400d7bb2

              SHA256

              ddcc7514a0ca6c4c261d55a5c818136cb6035676d1a56dbb224734c5db1a3064

              SHA512

              988b5bab81311ca5efd773fdd8c872173b42bebce79467615c7ad5ffdb3a0f670300b1d39ab86f62b2a6bea2aa140abfaca211b2c868c4a412a6d5a4c4a8fb8a

            • C:\Users\Admin\AppData\Local\Temp\OBXwo.bat

              Filesize

              133B

              MD5

              4e99d945ca61ed0b261a73d985f5420e

              SHA1

              ce08b5c3939572703ae753bfa72c0224400d7bb2

              SHA256

              ddcc7514a0ca6c4c261d55a5c818136cb6035676d1a56dbb224734c5db1a3064

              SHA512

              988b5bab81311ca5efd773fdd8c872173b42bebce79467615c7ad5ffdb3a0f670300b1d39ab86f62b2a6bea2aa140abfaca211b2c868c4a412a6d5a4c4a8fb8a

            • C:\Users\Admin\AppData\Local\Temp\Pfyia.bat

              Filesize

              164B

              MD5

              0af5f35091719d8ee61893a158b66625

              SHA1

              1f81728601f8714bfa7e2ca92f9d6a8f6aa89700

              SHA256

              ceac3aee5e97d760c72b18d62c3dfc7d73904366e230c2362c49e8ed700d46f9

              SHA512

              f01c7ecbb9682c2469628f7d1c7e38891b1b9352a27eed50e3597b281fc136f18a6deb4ca04843f632cce295dd8f194ff8c37d31d7167a7a25734d0789bf9baa

            • C:\Users\Admin\AppData\Local\Temp\Pfyia.bat

              Filesize

              164B

              MD5

              0af5f35091719d8ee61893a158b66625

              SHA1

              1f81728601f8714bfa7e2ca92f9d6a8f6aa89700

              SHA256

              ceac3aee5e97d760c72b18d62c3dfc7d73904366e230c2362c49e8ed700d46f9

              SHA512

              f01c7ecbb9682c2469628f7d1c7e38891b1b9352a27eed50e3597b281fc136f18a6deb4ca04843f632cce295dd8f194ff8c37d31d7167a7a25734d0789bf9baa

            • C:\Users\Admin\AppData\Local\Temp\uTsry.bat

              Filesize

              133B

              MD5

              5c5f6bd3f5ab15437a8d5a452f236cc7

              SHA1

              43dc4c4bcee42f7975f0027e2734c57115e5d7ce

              SHA256

              8f96e1c2750dc729faf255eb4df3f1e501d3394d8043f69dc56036a03b9ed947

              SHA512

              eed35f38654e1c5b4c1ea010f93d6be03250b77bd0e6f79ce12aaaa7333b9346afbd328f4de21e3fa6948d252cb9203a8bd103e0058c129d3130e7399e18b08f

            • C:\Users\Admin\AppData\Local\Temp\uTsry.bat

              Filesize

              133B

              MD5

              5c5f6bd3f5ab15437a8d5a452f236cc7

              SHA1

              43dc4c4bcee42f7975f0027e2734c57115e5d7ce

              SHA256

              8f96e1c2750dc729faf255eb4df3f1e501d3394d8043f69dc56036a03b9ed947

              SHA512

              eed35f38654e1c5b4c1ea010f93d6be03250b77bd0e6f79ce12aaaa7333b9346afbd328f4de21e3fa6948d252cb9203a8bd103e0058c129d3130e7399e18b08f

            • C:\Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • C:\Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • C:\Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • C:\Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • C:\Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • \Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • \Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • \Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • \Windows\msconfig32\msconfig32.exe

              Filesize

              1.1MB

              MD5

              1718c82cccfca4df051b2786e17ba893

              SHA1

              c115db6257caf357fed91a69949bfa11bc4ae7d1

              SHA256

              5598ac0322f2c778a6c338d5571e41d2d76c34d06fa5424090e8ba25745b000c

              SHA512

              550f59aca0150fbc3e9c6076c5628c16825d18cf9e4b1aa700b29755a39400d58c2aefcef6d6cd4dd39972e04d058456c3c57bc1e61ec6c4c9355eeacd5a6e31

            • memory/1064-175-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1064-165-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1064-159-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1064-167-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1304-176-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-189-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-203-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-169-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-200-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-198-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-174-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-154-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-177-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-179-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-182-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-184-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-186-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-196-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-191-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1304-193-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1476-149-0x0000000000400000-0x00000000007D4000-memory.dmp

              Filesize

              3.8MB

            • memory/1476-67-0x0000000000400000-0x00000000007D4000-memory.dmp

              Filesize

              3.8MB

            • memory/2012-164-0x0000000000400000-0x00000000007D4000-memory.dmp

              Filesize

              3.8MB

            • memory/2012-152-0x0000000000400000-0x00000000007D4000-memory.dmp

              Filesize

              3.8MB