Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2024, 17:51

General

  • Target

    a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe

  • Size

    151KB

  • MD5

    a7f0dd0cb9991516f790ec44755409b5

  • SHA1

    18d6987544371b43ce3248d159cef229d63025bf

  • SHA256

    a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274

  • SHA512

    42033b2a96e6c1a048c85b199b57a0dd75dacc4e0ef1efd031d384fd6d64a7e1ec5e8d18a595de571229b75da7d7bc92b64cc00d8554cac6bfe4d09544fbb741

  • SSDEEP

    3072:N+PpToisYIJJPuQJvYEnpZXNF+1/TniPnJptO/YfSzlMPCS1:NqoVYSPfRZX/sTiPnPtO2gGCS1

Score
9/10

Malware Config

Signatures

  • Renames multiple (7431) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
    "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3032
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Brlg.sys"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\ProgramData\Brlg.sys
        C:\ProgramData\Brlg.sys
        3⤵
        • Executes dropped EXE
        PID:3024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS.exe /Delete /TN "Windows Update BETA" /F
        3⤵
          PID:3032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • Runs ping.exe
          PID:2628
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\BlackStore_Help.txt

      Filesize

      550B

      MD5

      a6a00a9a281b2517364ec50b37871686

      SHA1

      43e5981a42e68e9720583deca079c46f91d245b6

      SHA256

      e028ecf6ea7087c5ced220129bae624b23cb75336404201c66fa6794324ed7a3

      SHA512

      af6b0c680a9fbfd452a28d9f4c01157d389fbcce8e6d0a0c32c7d2b8ce67c70ae9af1d07be6c7c778e7b7cdf2e261009a68edac233b2c166c6308c30c69ac0bd

    • C:\ProgramData\Brlg.sys

      Filesize

      5KB

      MD5

      ab65af4349e7c5b0872c8b808d036980

      SHA1

      414b2a2748b7ea6176c1d2453f89fdc8a2d349d0

      SHA256

      a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2

      SHA512

      2c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679