Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 08:34

General

  • Target

    KernelOS21H2 (2).bat

  • Size

    38KB

  • MD5

    b2c39c94a67e89dc4a633889f0575650

  • SHA1

    e8dc50ebfb34dfef62a83b328e4e5f61e6bc3a49

  • SHA256

    892043f3b79d937ac74943bee419135aaf64370b627313c4efd0919bcdbace62

  • SHA512

    7222655c44c39101c863ca95d862072abcd3c0eb28944301bb8c256f25bdb103d841df63f7af9d473656e8fa22985ba7fb9f80870abae55bf7a24ac5bba4799f

  • SSDEEP

    768:+TOLfw09oGDbfrdAUY5eCNldf2BWt9vOjfEv+/ZcbXmB9ofdfv3h8f+q1wqk:iku

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 7 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 15 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c chcp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:4552
      • C:\Windows\system32\chcp.com
        chcp 708
        2⤵
          PID:1268
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im explorer.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3576
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell "Set-ExecutionPolicy -ExecutionPolicy Unrestricted"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2900
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3724
          • C:\Windows\system32\powercfg.exe
            powercfg /import "C:\KernelOS-Modules\KernelOS Performance v6 IDLE ON.pow" 01001011-0100-1111-0101-001188888884
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4008
          • C:\Windows\system32\powercfg.exe
            powercfg /import "C:\KernelOS-Modules\KernelOS Performance v6.pow" 01001011-0100-1111-0101-001188888883
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3412
          • C:\Windows\system32\powercfg.exe
            powercfg /s 01001011-0100-1111-0101-001188888884
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\Windows\system32\powercfg.exe
            powercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3308
          • C:\Windows\system32\powercfg.exe
            powercfg -delete 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1092
          • C:\Windows\system32\powercfg.exe
            powercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:756
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4844
          • C:\Windows\system32\timeout.exe
            timeout /t 2 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3056
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3092
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe "Get-AppxPackage -AllUsers *WindowsStore* | Remove-AppxPackage"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1752
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3476
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:2376
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:1556
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3092
          • C:\Windows\system32\bcdedit.exe
            bcdedit /timeout 10
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3540
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set useplatformtick Yes
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4748
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set disabledynamictick Yes
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4532
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set bootmenupolicy Legacy
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3232
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set quietboot On
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3904
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set x2apicpolicy Disable
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:4584
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set nx OptIn
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:3420
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3776
          • C:\Windows\system32\timeout.exe
            timeout /t 3 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:3968
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic path win32_networkadapter get GUID | findstr "{"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4012
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_networkadapter get GUID
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3200
            • C:\Windows\system32\findstr.exe
              findstr "{"
              4⤵
                PID:4576
            • C:\Windows\system32\reg.exe
              reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TcpAckFrequency" /t REG_DWORD /d "1" /f
              3⤵
                PID:4220
              • C:\Windows\system32\reg.exe
                reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TcpDelAckTicks" /t REG_DWORD /d "0" /f
                3⤵
                  PID:1752
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TCPNoDelay" /t REG_DWORD /d "1" /f
                  3⤵
                    PID:1972
                  • C:\Windows\system32\timeout.exe
                    timeout /t 5 /nobreak
                    3⤵
                    • Delays execution with timeout.exe
                    PID:1256
                  • C:\Windows\system32\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F
                    3⤵
                      PID:1880
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F
                      3⤵
                        PID:4936
                      • C:\Windows\system32\reg.exe
                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\Security" /V "DisableSecuritySettingsCheck" /T "REG_DWORD" /D "00000001" /F
                        3⤵
                          PID:1184
                        • C:\Windows\system32\sc.exe
                          sc delete nvagent
                          3⤵
                          • Launches sc.exe
                          PID:3604
                        • C:\Windows\system32\timeout.exe
                          timeout /t 5 /nobreak
                          3⤵
                          • Delays execution with timeout.exe
                          PID:4232
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c where /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*
                          3⤵
                            PID:3600
                            • C:\Windows\system32\where.exe
                              where /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*
                              4⤵
                                PID:4736
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --uninstall --system-level --verbose-logging --force-uninstall
                              3⤵
                              • Modifies Installed Components in the registry
                              • Registers COM server for autorun
                              • Adds Run key to start application
                              • Installs/modifies Browser Helper Object
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3928
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7eb0f5460,0x7ff7eb0f5470,0x7ff7eb0f5480
                                4⤵
                                  PID:2780
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "0" "3928" "1692" "1536" "1696" "0" "0" "0" "0" "0" "0" "0" "0"
                                  4⤵
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:576
                              • C:\Windows\system32\sc.exe
                                sc delete edgeupdate
                                3⤵
                                • Launches sc.exe
                                PID:2380
                              • C:\Windows\system32\sc.exe
                                sc delete edgeupdatem
                                3⤵
                                • Launches sc.exe
                                PID:4908
                              • C:\Windows\system32\timeout.exe
                                timeout /t 10 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:4916
                              • C:\Windows\system32\shutdown.exe
                                shutdown -r -f -t 7 -c "Please wait until your PC restarts..."
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4348
                              • C:\Windows\system32\timeout.exe
                                timeout /t 3 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:2532
                              • C:\Windows\system32\timeout.exe
                                timeout /t 4 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:3308
                          • C:\Windows\system32\LogonUI.exe
                            "LogonUI.exe" /flags:0x4 /state0:0xa3960055 /state1:0x41c64e6d
                            1⤵
                            • Modifies data under HKEY_USERS
                            • Suspicious use of SetWindowsHookEx
                            PID:4008

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          3
                          T1060

                          Modify Existing Service

                          1
                          T1031

                          Browser Extensions

                          1
                          T1176

                          Defense Evasion

                          Modify Registry

                          4
                          T1112

                          Impair Defenses

                          1
                          T1562

                          Discovery

                          System Information Discovery

                          3
                          T1082

                          Query Registry

                          2
                          T1012

                          Impact

                          Service Stop

                          1
                          T1489

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                            Filesize

                            2KB

                            MD5

                            d136d3411d4aa688242c53cafb993aa6

                            SHA1

                            1a81cc78e3ca445d5a5193e49ddce26d5e25179f

                            SHA256

                            00ae5433c0107cc164516c7849b4cff7b6faeb52e5afa65c01dbd8c7a5efe397

                            SHA512

                            282ea53f8093c00e8c64d253782068211f8c4187391d5078755f55dedb8825c0042173d82f489d7b6c06e88184b70e83c1e92dadb80f57bd96c95855ac6b3da1

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                            Filesize

                            64B

                            MD5

                            5caad758326454b5788ec35315c4c304

                            SHA1

                            3aef8dba8042662a7fcf97e51047dc636b4d4724

                            SHA256

                            83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                            SHA512

                            4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q5zk410l.5ld.ps1
                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Windows\TEMP\MsEdgeCrashpad\settings.dat
                            Filesize

                            152B

                            MD5

                            94ce5de3dd1d43af1d7f06fc40f07570

                            SHA1

                            954bcaf4dbc580794f156e81eb58b90a1c61ccfa

                            SHA256

                            44d5136d3387f742ecc838244f0b272427ba7702627760e3c452d60702a97537

                            SHA512

                            aafab33cb88c85b979052e76bc50f3f8bff2672c970f0ac5502afccb2799b95ae9f0044f6dc9e7e0d4e205bed6e5c70fb942a00ffda2fea59c912581746b1e55

                          • C:\Windows\TEMP\MsEdgeCrashpad\throttle_store.dat
                            Filesize

                            20B

                            MD5

                            9e4e94633b73f4a7680240a0ffd6cd2c

                            SHA1

                            e68e02453ce22736169a56fdb59043d33668368f

                            SHA256

                            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                            SHA512

                            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                          • memory/1752-161-0x000001CA73310000-0x000001CA73326000-memory.dmp
                            Filesize

                            88KB

                          • memory/1752-158-0x000001CA726D0000-0x000001CA726E0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1752-159-0x000001CA726D0000-0x000001CA726E0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1752-160-0x000001CA726D0000-0x000001CA726E0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1752-162-0x000001CA732F0000-0x000001CA732FA000-memory.dmp
                            Filesize

                            40KB

                          • memory/1752-163-0x000001CA73390000-0x000001CA733B6000-memory.dmp
                            Filesize

                            152KB

                          • memory/2900-144-0x000001D750E00000-0x000001D750E10000-memory.dmp
                            Filesize

                            64KB

                          • memory/2900-143-0x000001D750E00000-0x000001D750E10000-memory.dmp
                            Filesize

                            64KB

                          • memory/2900-142-0x000001D750DC0000-0x000001D750DE2000-memory.dmp
                            Filesize

                            136KB