Resubmissions

01-04-2023 07:12

230401-h1ragshh9x 1

01-04-2023 07:00

230401-hsy1csge76 10

01-04-2023 06:57

230401-hq4stshh51 1

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 06:57

General

  • Target

    http://cdn.discordapp.com/attachments/1087849368675176460/1088103716277723146/Setup.rar

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 42 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://cdn.discordapp.com/attachments/1087849368675176460/1088103716277723146/Setup.rar
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1728
  • C:\Windows\System32\NOTEPAD.EXE
    "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\BackupSplit.bat
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1488
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2072
  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\9450122433f74a869960ce9a02320619 /t 1576 /p 1488
    1⤵
      PID:4960
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4072
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup\" -spe -an -ai#7zMap23296:72:7zEvent326
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1524
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup\" -spe -an -ai#7zMap16522:72:7zEvent8439
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:692
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" h -scrcSHA256 -i#7zMap26551:72:7zEvent17442
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2684
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup\" -spe -an -ai#7zMap23686:72:7zEvent5528
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1720

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYL8D8JJ\Setup[1].rar

        Filesize

        56.5MB

        MD5

        6305b5402391d1088f8086d21a24c241

        SHA1

        3eeac2dee953119bbe45eecd07c97833e97c9346

        SHA256

        90b0950960b30715a9f9c78ff507858c14655f55bd33ce76ff4e63d0a1eabb43

        SHA512

        3a40cbb093847f5372af9484bb8e9d74309e00ab556d1ad27df88da5d8482f34ffab1a12b25bc7a3b073dfe41c0fdd8fcb4251486b0ab211fb28402043aadc62

      • C:\Users\Admin\Downloads\Setup.rar.wd3ihwf.partial

        Filesize

        56.5MB

        MD5

        6305b5402391d1088f8086d21a24c241

        SHA1

        3eeac2dee953119bbe45eecd07c97833e97c9346

        SHA256

        90b0950960b30715a9f9c78ff507858c14655f55bd33ce76ff4e63d0a1eabb43

        SHA512

        3a40cbb093847f5372af9484bb8e9d74309e00ab556d1ad27df88da5d8482f34ffab1a12b25bc7a3b073dfe41c0fdd8fcb4251486b0ab211fb28402043aadc62

      • memory/2072-158-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-159-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-160-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-164-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-165-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-167-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-166-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-168-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-169-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB

      • memory/2072-170-0x000001300A520000-0x000001300A521000-memory.dmp

        Filesize

        4KB