Resubmissions

20-03-2024 09:55

240320-lxzn8sdh94 10

20-03-2024 09:53

240320-lwzb3sef3x 10

18-03-2024 09:01

240318-ky38dadf6s 10

Analysis

  • max time kernel
    163s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 09:01

General

  • Target

    01bf78841b63bcdd8280157c486b45ad74811c0251140a054de81a925ce7f716.exe

  • Size

    145KB

  • MD5

    7966a61801e560b0031ba0e7d5864456

  • SHA1

    bb737041b092879f10e400a599e5301d186bb6d9

  • SHA256

    01bf78841b63bcdd8280157c486b45ad74811c0251140a054de81a925ce7f716

  • SHA512

    475f41efdafcb2a19e3d0c47b824f13f7ad609412d5d99bd08346795e3f98a14c96ab62f1ff0305a9fffc8d6c025f7c4c2e8a1502bfdb17484add606539f94d6

  • SSDEEP

    3072:pqJogYkcSNm9V7DF78cwcmphqvbAw/rKfGT:pq2kc4m9tDp7wxhqnm

Malware Config

Signatures

  • Renames multiple (737) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01bf78841b63bcdd8280157c486b45ad74811c0251140a054de81a925ce7f716.exe
    "C:\Users\Admin\AppData\Local\Temp\01bf78841b63bcdd8280157c486b45ad74811c0251140a054de81a925ce7f716.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:1820
    • C:\ProgramData\EB80.tmp
      "C:\ProgramData\EB80.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\EB80.tmp >> NUL
        3⤵
          PID:1232
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:852
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
        1⤵
          PID:2384
        • C:\Windows\system32\printfilterpipelinesvc.exe
          C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
          1⤵
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:4644
          • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
            /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{2AFAC22C-97B3-4D3F-97C0-F5C670B92722}.xps" 133552262277120000
            2⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:1408

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini

          Filesize

          129B

          MD5

          2ccf90c91f225dd03232e81fd3271540

          SHA1

          db9498fc70bd798d96bbeb5548cee720862d60d5

          SHA256

          ae647b0104bf534e09b39722f2c03a07dc157ed5ed45ef7b6eb0f7d1bc3b5873

          SHA512

          a28391d2228be63ec74c4f2fbc75454f274b93a475b67bd1a2495cb840ab8db7ed811bc71ee165028d86b0456e95dbb58cde0ee4226be67c2e7dd3664613004a

        • C:\ProgramData\EB80.tmp

          Filesize

          14KB

          MD5

          294e9f64cb1642dd89229fff0592856b

          SHA1

          97b148c27f3da29ba7b18d6aee8a0db9102f47c9

          SHA256

          917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

          SHA512

          b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

        • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

          Filesize

          145KB

          MD5

          d0af5e05471102017de6ef4695d7f832

          SHA1

          ff5751954e95e2e202d1096157e6e3d1610971d7

          SHA256

          008ea735cd8cae0e1a8dfdf042f9e6ff3f700a9096eab571b15fcae8a40eb58c

          SHA512

          5da1686555af9916ebfa3758ffd286544eb46c37bfd5f74a573f42aff08cdf0a807f3c1683d60913724721c40e16ad42ac3f647527c0033e89db7aa558975413

        • C:\Users\Admin\AppData\Local\Temp\{102FF17C-F932-43D0-903D-07A36096EBB5}

          Filesize

          4KB

          MD5

          73e2ce5997e10db344bf439e3c78e7a2

          SHA1

          fcd3651fde44d26535be1fae1431be832bc6ce9a

          SHA256

          1840defbc4ed2ca99c2eeaf54d27a54d0bfa02165d1148b6b4bc18303b6fd92f

          SHA512

          58292edee0c4d0a2f48f004e6f4bcafa7162d778bf3a0982e30dcc11ded928a5d07f82a3d43ed7a989302ca5a65b2201aa1bb5946b561f196d3691a039a219b8

        • C:\fKwlk4hj5.README.txt

          Filesize

          629B

          MD5

          6773e35f848ca075a81e3eeb19221820

          SHA1

          e3ba485887c73a7f2b6e278e8cc376b323502596

          SHA256

          5b1cd3fb03117987e4c51a67cd101796451f15babfacb9c9c2832908229d358c

          SHA512

          88e27da84241b5a98e85d9ca7dc9eaae755401e899157676ee8dcccae023452f2a42a18c74ff8357eedf08836e930da4045a3dd7060cfaa992503d04852b8ec2

        • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\DDDDDDDDDDD

          Filesize

          129B

          MD5

          670a5458e297c242d48f0d2e0ebafcd2

          SHA1

          598756151a168914f67821c27c059f31eb6dbd5f

          SHA256

          698f5efc76783e5cad2dfb293e36a6cd946f22dc4464123f3c94e9567a14f42a

          SHA512

          52c627d5c58d56ff376bcabd7fc89ae3a97e61ffc70d8bcf45101d309ced72fdb1eb838484c7fa531883db89c3954c17dcde4a16003a768dff86410224a2c3ef

        • memory/608-2964-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

          Filesize

          4KB

        • memory/608-2962-0x000000007FE20000-0x000000007FE21000-memory.dmp

          Filesize

          4KB

        • memory/608-2973-0x000000007FE00000-0x000000007FE01000-memory.dmp

          Filesize

          4KB

        • memory/608-2972-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

          Filesize

          4KB

        • memory/608-2921-0x000000007FE40000-0x000000007FE41000-memory.dmp

          Filesize

          4KB

        • memory/608-2930-0x00000000024D0000-0x00000000024E0000-memory.dmp

          Filesize

          64KB

        • memory/608-2934-0x00000000024D0000-0x00000000024E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2967-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2970-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2963-0x00007FFD1F2D0000-0x00007FFD1F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-3000-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2931-0x00007FFD1F2D0000-0x00007FFD1F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2979-0x00007FFD1CD90000-0x00007FFD1CDA0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2965-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2966-0x00007FFD1F2D0000-0x00007FFD1F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2978-0x00007FFD1CD90000-0x00007FFD1CDA0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2968-0x00007FFD1F2D0000-0x00007FFD1F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2969-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2944-0x00007FFD1F2D0000-0x00007FFD1F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1408-2977-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2971-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2976-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2974-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/1408-2975-0x00007FFD5F250000-0x00007FFD5F445000-memory.dmp

          Filesize

          2.0MB

        • memory/4000-1031-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/4000-1026-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/4000-1027-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/4000-0-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/4000-1-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB

        • memory/4000-2-0x00000000032E0000-0x00000000032F0000-memory.dmp

          Filesize

          64KB