Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2023 10:49

General

  • Target

    https://cdn.discordapp.com/attachments/1016457788173582386/1097111331225743380/ampere_antivirus.exe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1016457788173582386/1097111331225743380/ampere_antivirus.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:788 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2408
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\totally not ldsjfkjsljfkdl.bat" "
        3⤵
          PID:3272
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\1min-2021-08-30_-_Boss_Time_-_www.FesliyanStudios.com.mp3"
          3⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:4688
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x150 0x488
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3464

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe

      Filesize

      1.3MB

      MD5

      7d67a1d43aeb4c6d6725132fee40f601

      SHA1

      060767f2ff0d0d7b10802997cc1b4d6f502bb3cd

      SHA256

      088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88

      SHA512

      133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\ampere_antivirus.exe.x7we080.partial

      Filesize

      1.3MB

      MD5

      7d67a1d43aeb4c6d6725132fee40f601

      SHA1

      060767f2ff0d0d7b10802997cc1b4d6f502bb3cd

      SHA256

      088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88

      SHA512

      133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WPCK8CWE\ampere_antivirus[1].exe

      Filesize

      1.3MB

      MD5

      7d67a1d43aeb4c6d6725132fee40f601

      SHA1

      060767f2ff0d0d7b10802997cc1b4d6f502bb3cd

      SHA256

      088749fa5ec02fdb9944919d255c686376cc3f3926558637afc37431a8d77b88

      SHA512

      133924f8ab1e31bbc65506766edfd92e76b42508b391232b1a2bf2743e317e8ce49ae05a2775582472d794b7e6f2ef4f8f8f9b6e5f5e93ee32d40c6e5c60c550

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WPCK8CWE\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\1min-2021-08-30_-_Boss_Time_-_www.FesliyanStudios.com.mp3

      Filesize

      1.4MB

      MD5

      f997f27a23daf587f619b8871c6cad43

      SHA1

      d28b04c805d9d3b11a53cfeda59f8f092a729f01

      SHA256

      4629388195345941f96af3deb8e54d8c015cb1ad57bf53f89df054ba4a6ac02f

      SHA512

      3a9ad0d082ea4f38276d5cd52d7c0f0839b9793e38dd4c0fafef09d7b19ea33749ed7e2d2b9add43516ebf64601d9cc64fb4b6087569413ef0216aaa9b49b49e

    • C:\Users\Admin\AppData\Local\Temp\1min-2021-08-30_-_Boss_Time_-_www.FesliyanStudios.com.mp3

      Filesize

      1.4MB

      MD5

      f997f27a23daf587f619b8871c6cad43

      SHA1

      d28b04c805d9d3b11a53cfeda59f8f092a729f01

      SHA256

      4629388195345941f96af3deb8e54d8c015cb1ad57bf53f89df054ba4a6ac02f

      SHA512

      3a9ad0d082ea4f38276d5cd52d7c0f0839b9793e38dd4c0fafef09d7b19ea33749ed7e2d2b9add43516ebf64601d9cc64fb4b6087569413ef0216aaa9b49b49e

    • C:\Users\Admin\AppData\Local\Temp\totally not ldsjfkjsljfkdl.bat

      Filesize

      981B

      MD5

      70c523b4f9f3f61b9f048d5973809650

      SHA1

      37a23c24550fb225ff902357b2a97e2f80a0f3cc

      SHA256

      d6f6a14a159e8ddb6566f85f8c36a7bcb29e3d8568c35ea6097bfa04b5a2dcfc

      SHA512

      923bf8dbd46cc29d6a96ed9655c90c34c2d14ef887e226a90b159a2c06bd2d2c0ad60d1cc836c3e4cbcf5acb9c44f81c725f78eddead37f94c9e7949f015ab76

    • memory/3104-146-0x0000000000AE0000-0x0000000000C3C000-memory.dmp

      Filesize

      1.4MB

    • memory/3104-148-0x000000001CE80000-0x000000001CE90000-memory.dmp

      Filesize

      64KB

    • memory/4688-210-0x00007FFCDACF0000-0x00007FFCDAD20000-memory.dmp

      Filesize

      192KB

    • memory/4688-206-0x00007FFCDAD90000-0x00007FFCDADA5000-memory.dmp

      Filesize

      84KB

    • memory/4688-173-0x00007FFCDDD20000-0x00007FFCDDD37000-memory.dmp

      Filesize

      92KB

    • memory/4688-171-0x00007FFCDDD60000-0x00007FFCDDD77000-memory.dmp

      Filesize

      92KB

    • memory/4688-175-0x00007FFCDDCE0000-0x00007FFCDDCFD000-memory.dmp

      Filesize

      116KB

    • memory/4688-176-0x00007FFCDDCC0000-0x00007FFCDDCD1000-memory.dmp

      Filesize

      68KB

    • memory/4688-174-0x00007FFCDDD00000-0x00007FFCDDD11000-memory.dmp

      Filesize

      68KB

    • memory/4688-170-0x00007FFCDDD80000-0x00007FFCDDD98000-memory.dmp

      Filesize

      96KB

    • memory/4688-169-0x00007FFCD8060000-0x00007FFCD8314000-memory.dmp

      Filesize

      2.7MB

    • memory/4688-177-0x000001A264630000-0x000001A2656DB000-memory.dmp

      Filesize

      16.7MB

    • memory/4688-179-0x00007FFCDDC80000-0x00007FFCDDCBF000-memory.dmp

      Filesize

      252KB

    • memory/4688-178-0x00007FFCDB200000-0x00007FFCDB400000-memory.dmp

      Filesize

      2.0MB

    • memory/4688-181-0x00007FFCDDC30000-0x00007FFCDDC48000-memory.dmp

      Filesize

      96KB

    • memory/4688-182-0x00007FFCDDC10000-0x00007FFCDDC21000-memory.dmp

      Filesize

      68KB

    • memory/4688-183-0x00007FFCDD8C0000-0x00007FFCDD8D1000-memory.dmp

      Filesize

      68KB

    • memory/4688-184-0x00007FFCDCA70000-0x00007FFCDCA81000-memory.dmp

      Filesize

      68KB

    • memory/4688-185-0x00007FFCDB1E0000-0x00007FFCDB1FB000-memory.dmp

      Filesize

      108KB

    • memory/4688-186-0x00007FFCDB1C0000-0x00007FFCDB1D1000-memory.dmp

      Filesize

      68KB

    • memory/4688-187-0x00007FFCDB1A0000-0x00007FFCDB1B8000-memory.dmp

      Filesize

      96KB

    • memory/4688-189-0x00007FFCDB100000-0x00007FFCDB167000-memory.dmp

      Filesize

      412KB

    • memory/4688-194-0x00007FFCDAFD0000-0x00007FFCDB027000-memory.dmp

      Filesize

      348KB

    • memory/4688-193-0x00007FFCDB030000-0x00007FFCDB041000-memory.dmp

      Filesize

      68KB

    • memory/4688-196-0x00007FFCDAF80000-0x00007FFCDAF93000-memory.dmp

      Filesize

      76KB

    • memory/4688-197-0x00007FFCDAF60000-0x00007FFCDAF71000-memory.dmp

      Filesize

      68KB

    • memory/4688-195-0x00007FFCDAFA0000-0x00007FFCDAFCF000-memory.dmp

      Filesize

      188KB

    • memory/4688-198-0x00007FFCDAE90000-0x00007FFCDAF55000-memory.dmp

      Filesize

      788KB

    • memory/4688-204-0x00007FFCDADD0000-0x00007FFCDADEE000-memory.dmp

      Filesize

      120KB

    • memory/4688-168-0x00007FFCEDBA0000-0x00007FFCEDBD4000-memory.dmp

      Filesize

      208KB

    • memory/4688-209-0x00007FFCDAD20000-0x00007FFCDAD32000-memory.dmp

      Filesize

      72KB

    • memory/4688-211-0x00007FFCDACD0000-0x00007FFCDACE7000-memory.dmp

      Filesize

      92KB

    • memory/4688-207-0x00007FFCDAD70000-0x00007FFCDAD84000-memory.dmp

      Filesize

      80KB

    • memory/4688-172-0x00007FFCDDD40000-0x00007FFCDDD51000-memory.dmp

      Filesize

      68KB

    • memory/4688-208-0x00007FFCDAD40000-0x00007FFCDAD6C000-memory.dmp

      Filesize

      176KB

    • memory/4688-205-0x00007FFCDADB0000-0x00007FFCDADC6000-memory.dmp

      Filesize

      88KB

    • memory/4688-203-0x00007FFCDADF0000-0x00007FFCDAE04000-memory.dmp

      Filesize

      80KB

    • memory/4688-202-0x00007FFCDAE10000-0x00007FFCDAE22000-memory.dmp

      Filesize

      72KB

    • memory/4688-201-0x00007FFCDAE30000-0x00007FFCDAE44000-memory.dmp

      Filesize

      80KB

    • memory/4688-200-0x00007FFCDAE50000-0x00007FFCDAE61000-memory.dmp

      Filesize

      68KB

    • memory/4688-199-0x00007FFCDAE70000-0x00007FFCDAE82000-memory.dmp

      Filesize

      72KB

    • memory/4688-192-0x00007FFCDB050000-0x00007FFCDB067000-memory.dmp

      Filesize

      92KB

    • memory/4688-191-0x00007FFCDB070000-0x00007FFCDB081000-memory.dmp

      Filesize

      68KB

    • memory/4688-190-0x00007FFCDB090000-0x00007FFCDB0FF000-memory.dmp

      Filesize

      444KB

    • memory/4688-188-0x00007FFCDB170000-0x00007FFCDB1A0000-memory.dmp

      Filesize

      192KB

    • memory/4688-180-0x00007FFCDDC50000-0x00007FFCDDC71000-memory.dmp

      Filesize

      132KB

    • memory/4688-212-0x000001A266430000-0x000001A267BE0000-memory.dmp

      Filesize

      23.7MB

    • memory/4688-214-0x00007FFCDAC90000-0x00007FFCDACA2000-memory.dmp

      Filesize

      72KB

    • memory/4688-213-0x00007FFCDACB0000-0x00007FFCDACC1000-memory.dmp

      Filesize

      68KB

    • memory/4688-215-0x00007FFCDAB10000-0x00007FFCDAC88000-memory.dmp

      Filesize

      1.5MB

    • memory/4688-216-0x00007FFCDAAF0000-0x00007FFCDAB07000-memory.dmp

      Filesize

      92KB

    • memory/4688-217-0x00007FFCDAA90000-0x00007FFCDAAE6000-memory.dmp

      Filesize

      344KB

    • memory/4688-218-0x00007FFCDAA60000-0x00007FFCDAA88000-memory.dmp

      Filesize

      160KB

    • memory/4688-219-0x00007FFCDAA30000-0x00007FFCDAA54000-memory.dmp

      Filesize

      144KB

    • memory/4688-221-0x00007FFCDAA10000-0x00007FFCDAA26000-memory.dmp

      Filesize

      88KB

    • memory/4688-222-0x00007FFCDA990000-0x00007FFCDAA05000-memory.dmp

      Filesize

      468KB

    • memory/4688-224-0x00007FFCDA8B0000-0x00007FFCDA91D000-memory.dmp

      Filesize

      436KB

    • memory/4688-223-0x00007FFCDA920000-0x00007FFCDA982000-memory.dmp

      Filesize

      392KB

    • memory/4688-226-0x00007FFCDA320000-0x00007FFCDA331000-memory.dmp

      Filesize

      68KB

    • memory/4688-227-0x00007FFCDA300000-0x00007FFCDA312000-memory.dmp

      Filesize

      72KB

    • memory/4688-225-0x00007FFCDA890000-0x00007FFCDA8A5000-memory.dmp

      Filesize

      84KB

    • memory/4688-220-0x00007FFCDE500000-0x00007FFCDE510000-memory.dmp

      Filesize

      64KB

    • memory/4688-228-0x00007FFCDA180000-0x00007FFCDA2FA000-memory.dmp

      Filesize

      1.5MB

    • memory/4688-240-0x00007FF633460000-0x00007FF633558000-memory.dmp

      Filesize

      992KB

    • memory/4688-241-0x00007FFCEDBA0000-0x00007FFCEDBD4000-memory.dmp

      Filesize

      208KB

    • memory/4688-167-0x00007FF633460000-0x00007FF633558000-memory.dmp

      Filesize

      992KB