Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 17:45

General

  • Target

    7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe

  • Size

    151KB

  • MD5

    31ed39e13ae9da7fa610f85b56838dde

  • SHA1

    ff602997ce7bdd695a282bd373daf57bea7a051f

  • SHA256

    7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f

  • SHA512

    199d70b70636555fbe753e83662cc672b5b06428050229856e9912488037cb4dae34a0766c3fcc560afd8fb07a4dcb5cfd8435a0fe3db86484a7929218cab5ee

  • SSDEEP

    3072:lAMP+TYgJWo6QD6ivAFvvYknplbZVaX6TEQZwRNfysqdoTPwum3n:OZNMnQFvM/lbbHTFZw/fLm3n

Malware Config

Signatures

  • Renames multiple (7135) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe
    "C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe" /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2268
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5052
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2296
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4092

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\CYLANCE_README.txt

            Filesize

            1KB

            MD5

            32ed1a322313315a29386ba2cffd8079

            SHA1

            839f482a0d3cb840cfe156785964cbc7a49df01b

            SHA256

            2c86c61081632759b94c6ab42ca4b780e626667ecf8cc834b63405bcf5f05d18

            SHA512

            e8983ea278d8cdeaeb51bb44eafee9d6494cea2f47406e3fb8828d9e33111af084fac39fa253758635bcdbf51e4da176c791d79aa27099dab8c6d75d6991e2fe

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

            Filesize

            13KB

            MD5

            c9d316cb9972e9b0270884903377b574

            SHA1

            81d1eedfd992649eb8f35916dc1f9e08e22de625

            SHA256

            4f5546c9c6a49f96cb8fcf0a25856301f2d9625378b55c418b6aa658e5154018

            SHA512

            f70018b497e1a2f00537825f34db3f9b8312cfe5bd6458eebc6443c4e04b50039d106ccb33925457c9867242d039307428e810e7b274ee6457eb2be2b3295e21

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

            Filesize

            13KB

            MD5

            89d94decf03187f66e87c6c7d9b24df8

            SHA1

            3d1bf61341dc7e293949a097b56d9ad8d8c74c2c

            SHA256

            879920ab5c99e912b6f2f1905c5e8b6cf08c84f35048980ecf39ba250b22afbc

            SHA512

            2b1ad3bca5f10bf15bc4da762c43295db5a1372d0c6de5a24a948f875c08a100d1f09ffcdd5dd6322767adf96fcf7ce2c07298d141a3fc60ddec19dfedb2f758