Analysis

  • max time kernel
    179s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 09:08

Errors

Reason
Machine shutdown

General

  • Target

    KernelOS21H2 (2).bat

  • Size

    38KB

  • MD5

    b2c39c94a67e89dc4a633889f0575650

  • SHA1

    e8dc50ebfb34dfef62a83b328e4e5f61e6bc3a49

  • SHA256

    892043f3b79d937ac74943bee419135aaf64370b627313c4efd0919bcdbace62

  • SHA512

    7222655c44c39101c863ca95d862072abcd3c0eb28944301bb8c256f25bdb103d841df63f7af9d473656e8fa22985ba7fb9f80870abae55bf7a24ac5bba4799f

  • SSDEEP

    768:+TOLfw09oGDbfrdAUY5eCNldf2BWt9vOjfEv+/ZcbXmB9ofdfv3h8f+q1wqk:iku

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 7 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 15 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c chcp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2464
      • C:\Windows\system32\chcp.com
        chcp 708
        2⤵
          PID:2180
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im explorer.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3744
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell "Set-ExecutionPolicy -ExecutionPolicy Unrestricted"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3100
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4144
          • C:\Windows\system32\powercfg.exe
            powercfg /import "C:\KernelOS-Modules\KernelOS Performance v6 IDLE ON.pow" 01001011-0100-1111-0101-001188888884
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
          • C:\Windows\system32\powercfg.exe
            powercfg /import "C:\KernelOS-Modules\KernelOS Performance v6.pow" 01001011-0100-1111-0101-001188888883
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3752
          • C:\Windows\system32\powercfg.exe
            powercfg /s 01001011-0100-1111-0101-001188888884
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4808
          • C:\Windows\system32\powercfg.exe
            powercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
          • C:\Windows\system32\powercfg.exe
            powercfg -delete 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2000
          • C:\Windows\system32\powercfg.exe
            powercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3220
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3104
          • C:\Windows\system32\timeout.exe
            timeout /t 2 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3808
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe "Get-AppxPackage -AllUsers *WindowsStore* | Remove-AppxPackage"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:768
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4920
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:1456
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4208
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:2728
          • C:\Windows\system32\bcdedit.exe
            bcdedit /timeout 10
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4084
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set useplatformtick Yes
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4964
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set disabledynamictick Yes
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3820
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set bootmenupolicy Legacy
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3984
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set quietboot On
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:2408
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set x2apicpolicy Disable
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3972
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set nx OptIn
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4620
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4708
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:1208
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic path win32_networkadapter get GUID | findstr "{"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3616
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_networkadapter get GUID
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4872
            • C:\Windows\system32\findstr.exe
              findstr "{"
              4⤵
                PID:1016
            • C:\Windows\system32\reg.exe
              reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{3A2F6F4A-4DC4-41EF-A7A2-479C06CEC140}" /v "TcpAckFrequency" /t REG_DWORD /d "1" /f
              3⤵
                PID:3496
              • C:\Windows\system32\reg.exe
                reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{3A2F6F4A-4DC4-41EF-A7A2-479C06CEC140}" /v "TcpDelAckTicks" /t REG_DWORD /d "0" /f
                3⤵
                  PID:3224
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{3A2F6F4A-4DC4-41EF-A7A2-479C06CEC140}" /v "TCPNoDelay" /t REG_DWORD /d "1" /f
                  3⤵
                    PID:3540
                  • C:\Windows\system32\timeout.exe
                    timeout /t 5 /nobreak
                    3⤵
                    • Delays execution with timeout.exe
                    PID:1212
                  • C:\Windows\system32\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F
                    3⤵
                      PID:3680
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F
                      3⤵
                        PID:1684
                      • C:\Windows\system32\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\Security" /V "DisableSecuritySettingsCheck" /T "REG_DWORD" /D "00000001" /F
                        3⤵
                          PID:4604
                        • C:\Windows\system32\sc.exe
                          sc delete nvagent
                          3⤵
                          • Launches sc.exe
                          PID:2172
                        • C:\Windows\system32\timeout.exe
                          timeout /t 5 /nobreak
                          3⤵
                          • Delays execution with timeout.exe
                          PID:3536
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c where /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*
                          3⤵
                            PID:3768
                            • C:\Windows\system32\where.exe
                              where /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*
                              4⤵
                                PID:3348
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --uninstall --system-level --verbose-logging --force-uninstall
                              3⤵
                              • Modifies Installed Components in the registry
                              • Registers COM server for autorun
                              • Adds Run key to start application
                              • Installs/modifies Browser Helper Object
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4048
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff70fbf5460,0x7ff70fbf5470,0x7ff70fbf5480
                                4⤵
                                  PID:4060
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "0" "4048" "1700" "1668" "1696" "0" "0" "0" "0" "0" "0" "0" "0"
                                  4⤵
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:4092
                              • C:\Windows\system32\sc.exe
                                sc delete edgeupdate
                                3⤵
                                • Launches sc.exe
                                PID:3220
                              • C:\Windows\system32\sc.exe
                                sc delete edgeupdatem
                                3⤵
                                • Launches sc.exe
                                PID:684
                              • C:\Windows\system32\timeout.exe
                                timeout /t 10 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:4580
                              • C:\Windows\system32\shutdown.exe
                                shutdown -r -f -t 7 -c "Please wait until your PC restarts..."
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2692
                              • C:\Windows\system32\timeout.exe
                                timeout /t 3 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:5104
                              • C:\Windows\system32\timeout.exe
                                timeout /t 4 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:1056
                          • C:\Windows\system32\LogonUI.exe
                            "LogonUI.exe" /flags:0x4 /state0:0xa3968855 /state1:0x41c64e6d
                            1⤵
                            • Modifies data under HKEY_USERS
                            • Suspicious use of SetWindowsHookEx
                            PID:2256

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          3
                          T1060

                          Modify Existing Service

                          1
                          T1031

                          Browser Extensions

                          1
                          T1176

                          Defense Evasion

                          Modify Registry

                          4
                          T1112

                          Impair Defenses

                          1
                          T1562

                          Discovery

                          System Information Discovery

                          3
                          T1082

                          Query Registry

                          2
                          T1012

                          Impact

                          Service Stop

                          1
                          T1489

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                            Filesize

                            2KB

                            MD5

                            d136d3411d4aa688242c53cafb993aa6

                            SHA1

                            1a81cc78e3ca445d5a5193e49ddce26d5e25179f

                            SHA256

                            00ae5433c0107cc164516c7849b4cff7b6faeb52e5afa65c01dbd8c7a5efe397

                            SHA512

                            282ea53f8093c00e8c64d253782068211f8c4187391d5078755f55dedb8825c0042173d82f489d7b6c06e88184b70e83c1e92dadb80f57bd96c95855ac6b3da1

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                            Filesize

                            64B

                            MD5

                            feadc4e1a70c13480ef147aca0c47bc0

                            SHA1

                            d7a5084c93842a290b24dacec0cd3904c2266819

                            SHA256

                            5b4f1fe7ba74b245b6368dbe4ceffa438f14eef08ba270e9a13c57505c7717ac

                            SHA512

                            c9681a19c773891808fefa9445cea598d118c83bba89530a51ab993adbff39bce72b43f8e99d0c68e4a44f7e0f4c8ec128641c45cd557a8e1215721d5d992a23

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l40xtllo.533.ps1
                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Windows\TEMP\MsEdgeCrashpad\settings.dat
                            Filesize

                            152B

                            MD5

                            126d7a542111ea35da5e305981766fdc

                            SHA1

                            872d3a96d2bcea466a7b41c2d5ab286550684c9f

                            SHA256

                            5aef6afd53fb15e902518749309592c6ec8e2e5560f3c41cdb2cb77b7b26941b

                            SHA512

                            bf24444cc10df033ee93d7cc9a4dc79c681562b94d42f0ad2fedb0fcae303d46aad12471e6b5b637ce4fba8e56a1b0c17bb0a0dd90ca20869bec0fba2f0ee369

                          • C:\Windows\TEMP\MsEdgeCrashpad\throttle_store.dat
                            Filesize

                            20B

                            MD5

                            9e4e94633b73f4a7680240a0ffd6cd2c

                            SHA1

                            e68e02453ce22736169a56fdb59043d33668368f

                            SHA256

                            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                            SHA512

                            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                          • memory/768-164-0x000001E658050000-0x000001E65805A000-memory.dmp
                            Filesize

                            40KB

                          • memory/768-160-0x000001E63DFA0000-0x000001E63DFB0000-memory.dmp
                            Filesize

                            64KB

                          • memory/768-162-0x000001E63DFA0000-0x000001E63DFB0000-memory.dmp
                            Filesize

                            64KB

                          • memory/768-161-0x000001E63DFA0000-0x000001E63DFB0000-memory.dmp
                            Filesize

                            64KB

                          • memory/768-163-0x000001E658060000-0x000001E658076000-memory.dmp
                            Filesize

                            88KB

                          • memory/768-165-0x000001E658260000-0x000001E658286000-memory.dmp
                            Filesize

                            152KB

                          • memory/2784-167-0x00007FF8799D0000-0x00007FF879A1B000-memory.dmp
                            Filesize

                            300KB

                          • memory/3100-148-0x000002B01B770000-0x000002B01B98C000-memory.dmp
                            Filesize

                            2.1MB

                          • memory/3100-145-0x000002B002580000-0x000002B002590000-memory.dmp
                            Filesize

                            64KB

                          • memory/3100-144-0x000002B002580000-0x000002B002590000-memory.dmp
                            Filesize

                            64KB

                          • memory/3100-143-0x000002B002580000-0x000002B002590000-memory.dmp
                            Filesize

                            64KB

                          • memory/3100-138-0x000002B01B740000-0x000002B01B762000-memory.dmp
                            Filesize

                            136KB