Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 14:39

General

  • Target

    Termius.exe

  • Size

    127.9MB

  • MD5

    d6ac79d520b70b1e97a7efecacf0e39c

  • SHA1

    a1081041746d5c5aedd755cc86a3c13c57d6d7f3

  • SHA256

    c49a2a50b1e38ddc9d293a4e87dc25ceecb19019a52b5f8fb9131f64b66d873b

  • SHA512

    bd8727b95623c12cd83e804f9c516109ad6b3fefe4b633741146890a16f45b2c820b4a368951f30b1df4d69ecb258dbdfdf62ee2a8376a557b96ed7378fa9575

  • SSDEEP

    1572864:deuFC6t472Ah+FgOqXJniFHUfN8WZis2Vawn0fhj5h8ioZFk5/SDJPtiwhkzLUsj:2SJZqT8Ois+nQAE5m0rWEDFMk7

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 14 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Termius.exe
    "C:\Users\Admin\AppData\Local\Temp\Termius.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\Users\Admin\AppData\Local\Temp\Termius.exe
      C:\Users\Admin\AppData\Local\Temp\Termius.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Termius /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Termius\Crashpad --url=https://o76327.ingest.sentry.io/api/193727/minidump/?sentry_key=55af16af94074b88844cd7e16f535fa5 --annotation=_productName=Termius --annotation=_version=8.10.4 --annotation=plat=Win32 --annotation=prod=Electron "--annotation=sentry___initialScope={\"environment\":\"production\"}" --annotation=ver=21.4.4 --initial-client-data=0x470,0x498,0x4a0,0x49c,0x4a4,0x8b65bc0,0x8b65bd0,0x8b65bdc
      2⤵
        PID:2676
      • C:\Users\Admin\AppData\Local\Temp\Termius.exe
        "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
        2⤵
          PID:4580
        • C:\Users\Admin\AppData\Local\Temp\Termius.exe
          "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --mojo-platform-channel-handle=2468 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
          2⤵
            PID:1176
          • C:\Users\Admin\AppData\Local\Temp\Termius.exe
            "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --app-user-model-id=electron.app.Termius --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2864 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
            • Checks computer location settings
            PID:4824
          • C:\Users\Admin\AppData\Local\Temp\Termius.exe
            "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --app-user-model-id=electron.app.Termius --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
            • Checks computer location settings
            PID:8
          • C:\Users\Admin\AppData\Local\Temp\Termius.exe
            "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --app-user-model-id=electron.app.Termius --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
            2⤵
            • Checks computer location settings
            PID:1520
          • C:\Users\Admin\AppData\Local\Temp\Termius.exe
            "C:\Users\Admin\AppData\Local\Temp\Termius.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Termius" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4128 --field-trial-handle=1944,i,11000358793501446811,4585042149557550683,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1560

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic
          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Termius\IndexedDB\file__0.indexeddb.leveldb\CURRENT
          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Roaming\Termius\Network\Network Persistent State
          Filesize

          535B

          MD5

          a5cedcb62e8532bccd494ae7510c1b75

          SHA1

          36d94d5cea2cfb7aa639d00c69a2d8479caf1bf5

          SHA256

          45f5613910778114d8b24700961a5aa0f4852d6f148534282d1344bece05efa7

          SHA512

          2587565f41b12ba66ccedac1d8f8304660a872a201d4fa73e9b9a193f3f9745efc094456a94c5ed9165a1d878ab23bb7c783d032831c778979a5c9121b62c2bc

        • C:\Users\Admin\AppData\Roaming\Termius\Network\Network Persistent State~RFe5876a2.TMP
          Filesize

          59B

          MD5

          2800881c775077e1c4b6e06bf4676de4

          SHA1

          2873631068c8b3b9495638c865915be822442c8b

          SHA256

          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

          SHA512

          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

        • C:\Users\Admin\AppData\Roaming\Termius\Preferences
          Filesize

          57B

          MD5

          58127c59cb9e1da127904c341d15372b

          SHA1

          62445484661d8036ce9788baeaba31d204e9a5fc

          SHA256

          be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

          SHA512

          8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

        • C:\Users\Admin\AppData\Roaming\Termius\Preferences~RFe5785ba.TMP
          Filesize

          86B

          MD5

          d11dedf80b85d8d9be3fec6bb292f64b

          SHA1

          aab8783454819cd66ddf7871e887abdba138aef3

          SHA256

          8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

          SHA512

          6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

        • C:\Users\Admin\AppData\Roaming\Termius\sentry\scope_v2.json
          Filesize

          2KB

          MD5

          929d34e98c9b667439f4a63fea9312a6

          SHA1

          911d84a95885539e040009f1f1ba3f78ce42ef29

          SHA256

          c5c65d36298784e1248b1e8838092e9526e42a8166c92bd2cc6d447db217e1df

          SHA512

          d96505924202275df1a2df7c93bea84e9f8aee6dcd339fc41852f847d7da3755dc8ffae39f7f24e12cc6468c61798c87bf253767e6c8c376d55c625a7b3bbe6f

        • C:\Users\Admin\AppData\Roaming\Termius\sentry\scope_v2.json
          Filesize

          3KB

          MD5

          78ff1fbfd9a523991d832cb32a733fce

          SHA1

          24c1f0fafc0b65efd08a304b35c358045736e322

          SHA256

          4d7eca3ecb44cd3897787f3b05802ffc00d8c5495117a133280a2f9a7823655a

          SHA512

          50ea06fe7a6d59f431206e13d84be243ae58d4eede578d17c7801f7c50b3e483ef5d495f405050512496de7c6c4ed33e82dd870dd580bf41d7a6924f40c3eff9

        • C:\Users\Admin\AppData\Roaming\Termius\sentry\scope_v2.json
          Filesize

          5KB

          MD5

          6b395480fa391e58170235e5844eec3d

          SHA1

          daf9f50025c28bb2f57592b4d12296f2ec01e300

          SHA256

          8bdd9d18b0433cfb28c57a86a9af7e89060c018a57beb28d4714c3fcc26915ae

          SHA512

          ab1b52fdd0c2c218f62502ecacaa5ce4885e9d786a59b976cce61e6200558a78368139ec77b470aba95468ea1b6979546fbece830303d701220624886e8240e9

        • \??\pipe\crashpad_3156_YHMOLWQJWWFXKJMH
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • memory/1560-147-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-148-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-149-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-154-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-153-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-156-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-155-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-158-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-157-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB

        • memory/1560-159-0x000000000E4F0000-0x000000000E4F1000-memory.dmp
          Filesize

          4KB