Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
14/04/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
TP165DemoSetup.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
TP165DemoSetup.exe
Resource
win10v2004-20230220-es
General
-
Target
TP165DemoSetup.exe
-
Size
1.0MB
-
MD5
1fae5897048b82a979d01a59d85c0f6a
-
SHA1
9c459457c3c5d8446639f5c6fcdf5ca9f9fb4f64
-
SHA256
a5e422d1a6fbe9813c6d8001dcb7365febc7e0f59f94578be0e0768632056143
-
SHA512
955ed1de0b4678246fef288616e127bcd818f1edd3979871ca1301d5b39c236d89ce01d8bc48d96ea74a3b81c9ac90b5254a81aba475235de862a855eab8d6fc
-
SSDEEP
24576:i20oVoGTTK+PEQ3+jUGbkIASNQgJVKrhfIw1U/17+xnccYWnL:i2RTTAubmkI5Qg6tf7scv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1188 TP165DemoSetup.tmp 1528 TrackPower.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\TrackPower\unins000.dat TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\unins000.dat TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-IVPSL.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-HMABM.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-2JFSF.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-02N1B.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-4GKH6.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-N76FU.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-I23PQ.tmp TP165DemoSetup.tmp File created C:\Program Files (x86)\TrackPower\is-7PK03.tmp TP165DemoSetup.tmp File opened for modification C:\Program Files (x86)\TrackPower\Stock.TMX TrackPower.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.TMX\ = "TrackPowerSettings" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\DefaultIcon TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\shell\open TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\DefaultIcon\ = "\"C:\\Program Files (x86)\\TrackPower\\Circuit.ico\"" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TMX TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.TPC\ = "TrackPowerCircuit" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\shell\open\command TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\shell TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\DefaultIcon\ = "\"C:\\Program Files (x86)\\TrackPower\\Settings.ico\"" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\shell TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\shell\open\command\ = "\"C:\\Program Files (x86)\\TrackPower\\TrackPower.EXE\" \"%1\"" TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\ = "TrackPower Circuit File" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\DefaultIcon TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\shell\open\command TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerSettings\ = "TrackPower Settings File" TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.TPC TP165DemoSetup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\shell\open TP165DemoSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TrackPowerCircuit\shell\open\command\ = "\"C:\\Program Files (x86)\\TrackPower\\TrackPower.EXE\" \"%1\"" TP165DemoSetup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 TP165DemoSetup.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1188 5060 TP165DemoSetup.exe 82 PID 5060 wrote to memory of 1188 5060 TP165DemoSetup.exe 82 PID 5060 wrote to memory of 1188 5060 TP165DemoSetup.exe 82 PID 1188 wrote to memory of 1528 1188 TP165DemoSetup.tmp 92 PID 1188 wrote to memory of 1528 1188 TP165DemoSetup.tmp 92 PID 1188 wrote to memory of 1528 1188 TP165DemoSetup.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\TP165DemoSetup.exe"C:\Users\Admin\AppData\Local\Temp\TP165DemoSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\is-C7R79.tmp\TP165DemoSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-C7R79.tmp\TP165DemoSetup.tmp" /SL5="$D0062,790253,54272,C:\Users\Admin\AppData\Local\Temp\TP165DemoSetup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\TrackPower\TrackPower.exe"C:\Program Files (x86)\TrackPower\TrackPower.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5c3447447d93305564b719aad58282ec9
SHA1c8fcd51f14051ee1f1b052858fa2bf080b72d3b7
SHA2563d6d30895300fe7f891af419ef3b4b2bad3742a37dc72c4e38105043da73f8a7
SHA5123f824e7f1c5024ac6bcd02379efc991c49e99f74c996b3511c4c99c8afe28a532119d115375eb7f5cdc368ea68f2a1e62eedb448549fe759e3af41c98ab786b8
-
Filesize
75B
MD558ff7a2ff096e892beff44a9018d9518
SHA1d9725826ab1bb9b117ce8f10d334449949bf7d3b
SHA25672e5c4b3711561ed66a3b35f0ff954408acd96f7cc89f863370750a89b122093
SHA512d438bac3896e9637922fb170e9e2b51d9904777ed0df99a45f369c05b07369ecd4ef53d58234d291927150e3b7c110d5ad7265ec87061740a3e114e31fb319a4
-
Filesize
2.5MB
MD5558233df96116fbccb7a4ca1e749b2e1
SHA1d7b3683bdb17fba75bd77d5243e4bc579510204f
SHA256de8e700a7131493883cd0d6faa77e4bda9ae7dbb4290369ec0ccbaf11e5bb440
SHA5123e9f802d71b87bc2984ca1aec8b22cb8cdb25b58e8388a3b41a66f91a3b77e4ef59cdc8ed716fc1f2a56e23c5eb653ab508dd378069f21635ad1e3eaf2372f81
-
Filesize
2.5MB
MD5558233df96116fbccb7a4ca1e749b2e1
SHA1d7b3683bdb17fba75bd77d5243e4bc579510204f
SHA256de8e700a7131493883cd0d6faa77e4bda9ae7dbb4290369ec0ccbaf11e5bb440
SHA5123e9f802d71b87bc2984ca1aec8b22cb8cdb25b58e8388a3b41a66f91a3b77e4ef59cdc8ed716fc1f2a56e23c5eb653ab508dd378069f21635ad1e3eaf2372f81
-
Filesize
2.5MB
MD5558233df96116fbccb7a4ca1e749b2e1
SHA1d7b3683bdb17fba75bd77d5243e4bc579510204f
SHA256de8e700a7131493883cd0d6faa77e4bda9ae7dbb4290369ec0ccbaf11e5bb440
SHA5123e9f802d71b87bc2984ca1aec8b22cb8cdb25b58e8388a3b41a66f91a3b77e4ef59cdc8ed716fc1f2a56e23c5eb653ab508dd378069f21635ad1e3eaf2372f81
-
Filesize
683KB
MD5278fe635c9715df4aaa5a1ede7fb6055
SHA104db150375043088aed618cb3cae41822407f583
SHA256e783ad0432ac41daef6153a3934fa59553cc275a895faf7d829a4b94195bacda
SHA512777b40cc30690478104fe1104ba9a32adc4f22b4c6cabe757dd6ba688cba2fcb24c303cef9538261e15b04c3f501882285cb3a21bdf18e37b78a6c433dd8331f
-
Filesize
683KB
MD5278fe635c9715df4aaa5a1ede7fb6055
SHA104db150375043088aed618cb3cae41822407f583
SHA256e783ad0432ac41daef6153a3934fa59553cc275a895faf7d829a4b94195bacda
SHA512777b40cc30690478104fe1104ba9a32adc4f22b4c6cabe757dd6ba688cba2fcb24c303cef9538261e15b04c3f501882285cb3a21bdf18e37b78a6c433dd8331f