Analysis

  • max time kernel
    297s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/04/2023, 07:26

General

  • Target

    3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe

  • Size

    2.4MB

  • MD5

    a62505758e85f40fa06345da8af15d21

  • SHA1

    21f1f6c7e18985baeb9082c3ccb7f30bdd32867a

  • SHA256

    3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637

  • SHA512

    8c712db84b35f977caa4f87efad7b54f6340c6efa46c4a9a222947cb917f32a122bc9f34c3f85f91927b511f1c372471a2db25b9668289733ac1f7dace747014

  • SSDEEP

    24576:FkfiQkUbTO8OwvQZGrpl9Y1fHUDNsk8scl9VgXRP1O8l7Y5q6Q3k4U+A4lZVQ8C7:qfiXGr1fdCTeP/Kq6P4V7WyvOkEm92w

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
    "C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4912
    • C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
      C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1200
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          4⤵
            PID:5096
        • C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
          "C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe"
          3⤵
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2556
          • C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
            C:\Users\Admin\AppData\Local\Temp\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4136
    • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5056

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3f9f8d6e19536d323a9bd32dd11c50f6998649dd5e3f00f946d03fed81783637.exe.log

            Filesize

            1KB

            MD5

            5c01a57bb6376dc958d99ed7a67870ff

            SHA1

            d092c7dfd148ac12b086049d215e6b00bd78628d

            SHA256

            cb8fd245425e915bfc5ff411f26303f7cb4a30ed37f2ea4a2f0a12501aa5f2a4

            SHA512

            e4e3a4b74f8e209573cce58b572c1f71653e6f4df98f98c5a1cecdf76c9ffb91d5e6994c89df41c9f3613a0584301a56ca922ab7497a434e108b28dcd7d33038

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            1KB

            MD5

            b42b8394f52b01b93879625688c3d79d

            SHA1

            3ed5877ab13e7655482c19e8b7511f8b2bfcdbb3

            SHA256

            b7b0a0ab5e777b74a8d7ec285804091eb3a4c71fcc2c57cddfa8541d05409cdd

            SHA512

            86357e54c29ee9c107b5655d457121f35117565fae4fdd018e56079eb7ca012e4afe0a5d5562bc2996b932b02450ad0fbb7f27047315b524138a0fe08c4f79c2

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

            Filesize

            45KB

            MD5

            5f640bd48e2547b4c1a7421f080f815f

            SHA1

            a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

            SHA256

            916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

            SHA512

            a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            16KB

            MD5

            21acbfa581fdec5a961587378a969032

            SHA1

            6b20c91193fe978e98c2376bae3d3a55da26a142

            SHA256

            a9588730f207204752b42ecabeef0762107089cb35076819715d6e13f6ddf37a

            SHA512

            9ee6deac03cd604d47ac4169c9ca731907f9e0c9ebc8cff650b78f182f3f4af4b45868b3a43cea395aefca5b2567774e81f6a6c6c2972d53d4842bca2883d03a

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2m4hdder.dvv.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • memory/1020-119-0x0000000006370000-0x0000000006402000-memory.dmp

            Filesize

            584KB

          • memory/1020-122-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

            Filesize

            64KB

          • memory/1020-121-0x0000000006490000-0x00000000067E0000-memory.dmp

            Filesize

            3.3MB

          • memory/1020-120-0x0000000006460000-0x0000000006482000-memory.dmp

            Filesize

            136KB

          • memory/1020-118-0x00000000051B0000-0x0000000005238000-memory.dmp

            Filesize

            544KB

          • memory/1020-116-0x0000000000360000-0x00000000005CE000-memory.dmp

            Filesize

            2.4MB

          • memory/1020-117-0x0000000004EF0000-0x000000000509A000-memory.dmp

            Filesize

            1.7MB

          • memory/1020-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

            Filesize

            64KB

          • memory/1200-218-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-196-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-1844-0x00000000053A0000-0x00000000053B0000-memory.dmp

            Filesize

            64KB

          • memory/1200-224-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-222-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-220-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-216-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-214-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-158-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/1200-212-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-161-0x00000000053B0000-0x00000000054B8000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-162-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-163-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-165-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-167-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-168-0x00000000053A0000-0x00000000053B0000-memory.dmp

            Filesize

            64KB

          • memory/1200-170-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-172-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-174-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-176-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-178-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-180-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-182-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-184-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-186-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-188-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-190-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-192-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-194-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-210-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-198-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-200-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-202-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-204-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-206-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/1200-208-0x00000000053B0000-0x00000000054B2000-memory.dmp

            Filesize

            1.0MB

          • memory/2556-5495-0x00000000069E0000-0x00000000069F0000-memory.dmp

            Filesize

            64KB

          • memory/2556-5520-0x00000000069E0000-0x00000000069F0000-memory.dmp

            Filesize

            64KB

          • memory/2556-5519-0x00000000069E0000-0x00000000069F0000-memory.dmp

            Filesize

            64KB

          • memory/2556-5498-0x0000000007FB0000-0x0000000007FFB000-memory.dmp

            Filesize

            300KB

          • memory/2556-5496-0x00000000069E0000-0x00000000069F0000-memory.dmp

            Filesize

            64KB

          • memory/4136-8427-0x0000000005710000-0x0000000005720000-memory.dmp

            Filesize

            64KB

          • memory/4136-5696-0x0000000005710000-0x0000000005720000-memory.dmp

            Filesize

            64KB

          • memory/4272-5491-0x0000000005220000-0x0000000005230000-memory.dmp

            Filesize

            64KB

          • memory/4272-5518-0x0000000005220000-0x0000000005230000-memory.dmp

            Filesize

            64KB

          • memory/4272-5490-0x0000000006860000-0x0000000006BB0000-memory.dmp

            Filesize

            3.3MB

          • memory/4912-128-0x00000000042F0000-0x0000000004300000-memory.dmp

            Filesize

            64KB

          • memory/4912-132-0x0000000007AC0000-0x0000000007B0B000-memory.dmp

            Filesize

            300KB

          • memory/4912-148-0x00000000094B0000-0x0000000009B28000-memory.dmp

            Filesize

            6.5MB

          • memory/4912-149-0x0000000008BD0000-0x0000000008BEA000-memory.dmp

            Filesize

            104KB

          • memory/4912-127-0x00000000042F0000-0x0000000004300000-memory.dmp

            Filesize

            64KB

          • memory/4912-131-0x0000000007A90000-0x0000000007AAC000-memory.dmp

            Filesize

            112KB

          • memory/4912-126-0x0000000006D40000-0x0000000007368000-memory.dmp

            Filesize

            6.2MB

          • memory/4912-133-0x0000000007DF0000-0x0000000007E66000-memory.dmp

            Filesize

            472KB

          • memory/4912-129-0x0000000007410000-0x0000000007476000-memory.dmp

            Filesize

            408KB

          • memory/4912-151-0x00000000042F0000-0x0000000004300000-memory.dmp

            Filesize

            64KB

          • memory/4912-125-0x00000000042A0000-0x00000000042D6000-memory.dmp

            Filesize

            216KB

          • memory/4912-152-0x00000000042F0000-0x0000000004300000-memory.dmp

            Filesize

            64KB

          • memory/4912-130-0x0000000007480000-0x00000000074E6000-memory.dmp

            Filesize

            408KB