Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2023 10:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1016457788173582386/1097111331225743380/ampere_antivirus.exe
Resource
win10v2004-20230220-en
General
-
Target
https://cdn.discordapp.com/attachments/1016457788173582386/1097111331225743380/ampere_antivirus.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation ampere_antivirus.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 ampere_antivirus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d42e80ebae45d901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31027297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3951177374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{16598ED1-DC55-11ED-9EF6-F6AC10968584} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388414328" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31027297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3951177374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{0899CC10-AA37-4441-AF06-17A3C3EACFE1}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings ampere_antivirus.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4688 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4688 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3464 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3464 AUDIODG.EXE Token: 33 4688 vlc.exe Token: SeIncBasePriorityPrivilege 4688 vlc.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 788 iexplore.exe 788 iexplore.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 788 iexplore.exe 788 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 4688 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 788 wrote to memory of 2408 788 iexplore.exe 85 PID 788 wrote to memory of 2408 788 iexplore.exe 85 PID 788 wrote to memory of 2408 788 iexplore.exe 85 PID 788 wrote to memory of 3104 788 iexplore.exe 89 PID 788 wrote to memory of 3104 788 iexplore.exe 89 PID 3104 wrote to memory of 3272 3104 ampere_antivirus.exe 92 PID 3104 wrote to memory of 3272 3104 ampere_antivirus.exe 92 PID 3104 wrote to memory of 4688 3104 ampere_antivirus.exe 95 PID 3104 wrote to memory of 4688 3104 ampere_antivirus.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1016457788173582386/1097111331225743380/ampere_antivirus.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:788 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\totally not ldsjfkjsljfkdl.bat" "3⤵PID:3272
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\1min-2021-08-30_-_Boss_Time_-_www.FesliyanStudios.com.mp3"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
PID:3464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57d67a1d43aeb4c6d6725132fee40f601
SHA1060767f2ff0d0d7b10802997cc1b4d6f502bb3cd
SHA256088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88
SHA512133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe.x7we080.partial
Filesize1.3MB
MD57d67a1d43aeb4c6d6725132fee40f601
SHA1060767f2ff0d0d7b10802997cc1b4d6f502bb3cd
SHA256088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88
SHA512133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550
-
Filesize
1.3MB
MD57d67a1d43aeb4c6d6725132fee40f601
SHA1060767f2ff0d0d7b10802997cc1b4d6f502bb3cd
SHA256088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88
SHA512133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1.4MB
MD5f997f27a23daf587f619b8871c6cad43
SHA1d28b04c805d9d3b11a53cfeda59f8f092a729f01
SHA2564629388195345941f96af3deb8e54d8c015cb1ad57bf53f89df054ba4a6ac02f
SHA5123a9ad0d082ea4f38276d5cd52d7c0f0839b9793e38dd4c0fafef09d7b19ea33749ed7e2d2b9add43516ebf64601d9cc64fb4b6087569413ef0216aaa9b49b49e
-
Filesize
1.4MB
MD5f997f27a23daf587f619b8871c6cad43
SHA1d28b04c805d9d3b11a53cfeda59f8f092a729f01
SHA2564629388195345941f96af3deb8e54d8c015cb1ad57bf53f89df054ba4a6ac02f
SHA5123a9ad0d082ea4f38276d5cd52d7c0f0839b9793e38dd4c0fafef09d7b19ea33749ed7e2d2b9add43516ebf64601d9cc64fb4b6087569413ef0216aaa9b49b49e
-
Filesize
981B
MD570c523b4f9f3f61b9f048d5973809650
SHA137a23c24550fb225ff902357b2a97e2f80a0f3cc
SHA256d6f6a14a159e8ddb6566f85f8c36a7bcb29e3d8568c35ea6097bfa04b5a2dcfc
SHA512923bf8dbd46cc29d6a96ed9655c90c34c2d14ef887e226a90b159a2c06bd2d2c0ad60d1cc836c3e4cbcf5acb9c44f81c725f78eddead37f94c9e7949f015ab76