Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 17:51

General

  • Target

    a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe

  • Size

    151KB

  • MD5

    a7f0dd0cb9991516f790ec44755409b5

  • SHA1

    18d6987544371b43ce3248d159cef229d63025bf

  • SHA256

    a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274

  • SHA512

    42033b2a96e6c1a048c85b199b57a0dd75dacc4e0ef1efd031d384fd6d64a7e1ec5e8d18a595de571229b75da7d7bc92b64cc00d8554cac6bfe4d09544fbb741

  • SSDEEP

    3072:N+PpToisYIJJPuQJvYEnpZXNF+1/TniPnJptO/YfSzlMPCS1:NqoVYSPfRZX/sTiPnPtO2gGCS1

Score
9/10

Malware Config

Signatures

  • Renames multiple (6586) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
    "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4232
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Brlg.sys"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\ProgramData\Brlg.sys
        C:\ProgramData\Brlg.sys
        3⤵
        • Executes dropped EXE
        PID:4020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS.exe /Delete /TN "Windows Update BETA" /F
        3⤵
          PID:1012
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • Runs ping.exe
          PID:1096
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:284
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\BlackStore_Help.txt

        Filesize

        550B

        MD5

        a6a00a9a281b2517364ec50b37871686

        SHA1

        43e5981a42e68e9720583deca079c46f91d245b6

        SHA256

        e028ecf6ea7087c5ced220129bae624b23cb75336404201c66fa6794324ed7a3

        SHA512

        af6b0c680a9fbfd452a28d9f4c01157d389fbcce8e6d0a0c32c7d2b8ce67c70ae9af1d07be6c7c778e7b7cdf2e261009a68edac233b2c166c6308c30c69ac0bd

      • C:\ProgramData\Brlg.sys

        Filesize

        5KB

        MD5

        ab65af4349e7c5b0872c8b808d036980

        SHA1

        414b2a2748b7ea6176c1d2453f89fdc8a2d349d0

        SHA256

        a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2

        SHA512

        2c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

        Filesize

        13KB

        MD5

        638d7f3571523a84604da4674d4f739e

        SHA1

        fea6eee4d7ce413e32ba849b809040bcf66bd357

        SHA256

        a484823f74eb0f22bd879226aae7747ecb80b8093df47d5ae529a7f80a3393d7

        SHA512

        c21f5981b039896ace3e96f63352a27a88bc9d3dbacc94a09f0763386a89feff1ab0f8f8019f14217551e92cd7026e77a9e0475fa92bfe4f2b0ff354f3d3ff99

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

        Filesize

        13KB

        MD5

        1631734b933c897f63b0b2a1e269c9aa

        SHA1

        c98b6a22809daf05f9577b8c2d6f08dce04a5bec

        SHA256

        29241504c30c514379e39507461ccaa734f59c7ee5086aca3d243db0605810e3

        SHA512

        8826c003f7bdc499768403e8088e539ced5542c5087ac809d690289d74650a794ec42cee84656bac57d51e9245780583de7eccd7ca19eaa25f84160a453c4abd