Analysis

  • max time kernel
    63s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 09:14

General

  • Target

    bingdu/爱比较抬棺_TMDprotected from thrretbook.exe

  • Size

    29.0MB

  • MD5

    d0cc7d1a14561d9a133ed12d4694fdeb

  • SHA1

    470e667842a11a6669ba075052c9c235db3aef2a

  • SHA256

    5929bd7cabc52719ff3a5a29ffc338def05771afe085fbf4fda3dacaadfa86cb

  • SHA512

    2079fe22587cd3fe626b124a1fe1ed73cee20e1773aee63eb263a8c2eaeb61d610d3a6c366875610cccfabc445d0ca99d4cbecf27d913a53584a22a26787fca5

  • SSDEEP

    786432:ahatI81fyQnJnJvvWiSVuKoWvy6UyXlOGFFa8i971/Oh6WHcVXdY:ahv+yQJJv+j7vCWaX7I8JK

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 1 IoCs
  • Drops file in Drivers directory 6 IoCs
  • Sets file execution options in registry 2 TTPs 30 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 29 IoCs
  • Runs net.exe
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bingdu\爱比较抬棺_TMDprotected from thrretbook.exe
    "C:\Users\Admin\AppData\Local\Temp\bingdu\爱比较抬棺_TMDprotected from thrretbook.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Sets service image path in registry
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\dead.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Windows\SysWOW64\cacls.exe
        "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
        3⤵
          PID:2084
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im explorer.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Windows\SysWOW64\net.exe
        net localgroup administrator User is locked /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup administrator User is locked /add
          3⤵
            PID:1732
        • C:\Windows\SysWOW64\net.exe
          net user User is locked locked /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user User is locked locked /add
            3⤵
              PID:4300
          • C:\Windows\SysWOW64\net.exe
            net user Administrator locked
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 user Administrator locked
              3⤵
                PID:1372
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x4a4 0x420
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:464

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Winlogon Helper DLL

          1
          T1004

          Registry Run Keys / Startup Folder

          3
          T1060

          Change Default File Association

          1
          T1042

          Bootkit

          1
          T1067

          Defense Evasion

          Modify Registry

          5
          T1112

          Virtualization/Sandbox Evasion

          1
          T1497

          Discovery

          Query Registry

          3
          T1012

          Virtualization/Sandbox Evasion

          1
          T1497

          System Information Discovery

          4
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\bingdu\1.mp4
            Filesize

            1.0MB

            MD5

            890b16ca3279ef45465a0b562947b76d

            SHA1

            168c0541f03c97af6bcf909f80cd8d2b3e42b4b9

            SHA256

            b285ea52d9650084f18469a3c7c292ea2fdd0cd46143719f092a434967954c5c

            SHA512

            6b3f6601d55db6dc05a400cccb9c5ebebc0c03cf04744b3beae3e525a214b95c4443dc5525c27aa8c1e3787f23c13268e4e8cbcfd95281edc0cdbe07d7ab316b

          • C:\Users\Admin\AppData\Local\Temp\bingdu\WinIo32.dll
            Filesize

            48KB

            MD5

            92cd248684fdd7704f4e2ac6f9f719f7

            SHA1

            4648dc4db472f89071ba104de2e785d791bb04d9

            SHA256

            0ef0ed91aa7c95a9589b552b4ca4773ab03232a75cbbef4451e409c002538958

            SHA512

            1cf9e18fdf002046c8c1d0dda77874829c8dd65ebaca698570fc98d47565dfb54b29bac6a27557a4a1cd4f181c8cfa331f18f980d6ade0b92f8608867a1f8f04

          • C:\Users\Admin\AppData\Local\Temp\bingdu\WinIo32.dll
            Filesize

            48KB

            MD5

            92cd248684fdd7704f4e2ac6f9f719f7

            SHA1

            4648dc4db472f89071ba104de2e785d791bb04d9

            SHA256

            0ef0ed91aa7c95a9589b552b4ca4773ab03232a75cbbef4451e409c002538958

            SHA512

            1cf9e18fdf002046c8c1d0dda77874829c8dd65ebaca698570fc98d47565dfb54b29bac6a27557a4a1cd4f181c8cfa331f18f980d6ade0b92f8608867a1f8f04

          • C:\Users\Admin\AppData\Local\Temp\bingdu\amp1
            Filesize

            45B

            MD5

            789b92cf7ab3c0c416215a4432b708ad

            SHA1

            731c68459386b0274ddbe79d881ceec58c4206be

            SHA256

            8b7797d2630384c33fc034588eb6fd514a40c74cbfc5b83d83e0cdd7631cca7d

            SHA512

            a2253186cb64a07dcde42d34152dda1f5054eae6495c01558bfa6470a556966cd6fc5e7f1873891563b9f8d6303d9a9bfc53e0d4d25a917b5a17742fe9e7c093

          • C:\Users\Admin\AppData\Local\Temp\getadmin.vbs
            Filesize

            116B

            MD5

            fcd771586cbdd090dbfb8ea2dbd6db3e

            SHA1

            36936229aa2bd6ffc3147a6e5fc1eca92f5fc129

            SHA256

            bbb1e16b5329bd29698b9ec131390cf36ac4303e629d9818e5b3f529b6531938

            SHA512

            f7505cd247712b7032cb22576cebe4dc12ad1c3af682d45ebec4bc2882460db2250617ee3a227ed51fad9187a6f498eca3bbe1dfa878a28842f81d404e5ee34a

          • C:\Windows\SysWOW64\dead.bat
            Filesize

            845B

            MD5

            27e6650cad8a0237ff689dbe13aeb782

            SHA1

            945c85a4c471a37e499778206c894bc3ab8f0107

            SHA256

            1ef5a6326c53a33a6cc715e9cba70be1f645ad2d0e712969ef3cd2ce5a058dcf

            SHA512

            ebefba8979dc9bcfb24ac2814e234d4e7bf3061a1f1c89a61e4f79ef919f100384f7c3d3aeca3b27cfed10852e421e43a7e46961945b292df70ff3e4f79fefe9

          • memory/4944-182-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-184-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-134-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-136-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-166-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-138-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-133-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-181-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-137-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-135-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-185-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-186-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-187-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-188-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-189-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-190-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-191-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-192-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB

          • memory/4944-193-0x0000000000400000-0x00000000025A9000-memory.dmp
            Filesize

            33.7MB