Resubmissions

15-05-2024 11:58

240515-n495nagc6y 10

15-05-2024 11:54

240515-n3d1tsgd33 4

15-05-2024 09:22

240515-lb8p1sba32 10

Analysis

  • max time kernel
    235s
  • max time network
    264s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-05-2024 11:58

General

  • Target

    4423890.rar

  • Size

    11.2MB

  • MD5

    ff7553a8d62ba75491119628aa7ede6e

  • SHA1

    105b16f65c61570fd9c6ff2077597ba626026cda

  • SHA256

    58fb41c622cfccae8febc06e0c04f25bdb613a5b260ae6f404e9d0eda5ea86ab

  • SHA512

    ee01b5273fa7fb49eb8f55b995174bb869ebe77854427c4691e8980f5c2b49eef66a9e3fc8ecb6dd2388f390423318653b3573d1002af3124c70a42ed5815c22

  • SSDEEP

    196608:f9VizBum/MJuS5PuZBv5z7/AGUnfbhI7epRSv6EjBGu0wcDGIuPJGopuS5R:X4BF/GuS5PuZLQGOfeavSNjgu0tiI1o/

Malware Config

Signatures

  • DarkTrack

    DarkTrack is a remote administration tool written in delphi.

  • DarkTrack payload 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\4423890.rar
    1⤵
    • Modifies registry class
    PID:212
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5112
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1476
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\4423890.rar"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2352
    • C:\Users\Admin\Desktop\Predstavlenie № 6-51-2024 .docx.exe
      "C:\Users\Admin\Desktop\Predstavlenie № 6-51-2024 .docx.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\zapros.docx" /o ""
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4984
      • C:\Users\Admin\AppData\Local\Temp\rupedoras.exe
        C:\Users\Admin\AppData\Local\Temp\rupedoras.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1892
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Klog.dat
        2⤵
        • Opens file in notepad (likely ransom note)
        PID:3328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Klog.dat

      Filesize

      578B

      MD5

      aea50de80ee06f58ca7269d995643107

      SHA1

      8831309e7dabf84406619ce6329d758bbef0b751

      SHA256

      e03fff1947e32a2206de556197b51f0ca0798c2023b0e742e25320abd5ee8f8e

      SHA512

      c6815dd334043ec8c762ad50b85a458d651c952f70aa8231c96e16c079484c69faa96338d84d5c743d8f522b5479678b56db48810fa6c0c052f8d40dc2f70f20

    • C:\Users\Admin\AppData\Local\Temp\rupedoras.exe

      Filesize

      11.2MB

      MD5

      d483c1a9718cf5d880b3cce5d6ff7423

      SHA1

      72be5e949dd6923a43e7eaab1811baea4bc4b644

      SHA256

      8df595a1528a09fdcfe237a7dd1009d1380a886875747d1b145925968463f7bd

      SHA512

      370e220b3bdb617a12479db075ee26741075306ce7a72237115b2d79c452baadf931ccf3b422e9d0ef1eb0138316c3233f3ecd27074f3e797dc20ee974eb6fe4

    • C:\Users\Admin\AppData\Local\Temp\zapros.docx

      Filesize

      11KB

      MD5

      9871272af8b06b484f0529c10350a910

      SHA1

      707979b027f371989fb71e36795b652a2d466592

      SHA256

      c2a256547433bec8d7afbed923f453eb2df978f18ed498e82bb2b244b126a9f3

      SHA512

      5bd60de706ed3ef717177b08fa69ebc8117fe52bf53e896b91d102430b4b976b136f2df75fe4d1cb9cf16f5e73052e030e364bdf212148b1471e9c2b99f76a4c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851218[[fn=gb]].xsl

      Filesize

      262KB

      MD5

      51d32ee5bc7ab811041f799652d26e04

      SHA1

      412193006aa3ef19e0a57e16acf86b830993024a

      SHA256

      6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

      SHA512

      5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

    • C:\Users\Admin\Desktop\Predstavlenie № 6-51-2024 .docx.exe

      Filesize

      11.3MB

      MD5

      45ae0c08a1fb98fe77e4cd127b79ef7d

      SHA1

      12c7847fc2567ee9e6c0010f5c311753c017fa48

      SHA256

      bb8165b8f60818061d12cac775d8d41436b16c9b40e01071fca7fb96f6ef435e

      SHA512

      21cc13630fc1fe3bea4d45e356e63d4e94db7357040793b4d091ef75b2cf05191037380c493b944d1ecf748b9bd9935f1f91ba0c8654c57dbbe4530ab4fff4cd

    • memory/1892-698-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/1892-701-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/1892-700-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/1892-702-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/1892-703-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/1892-704-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/4160-197-0x0000000006E50000-0x0000000006E5A000-memory.dmp

      Filesize

      40KB

    • memory/4160-156-0x0000000000400000-0x0000000001F60000-memory.dmp

      Filesize

      27.4MB

    • memory/4160-195-0x00000000064F0000-0x000000000658C000-memory.dmp

      Filesize

      624KB

    • memory/4160-194-0x0000000006450000-0x00000000064E2000-memory.dmp

      Filesize

      584KB

    • memory/4160-193-0x0000000006600000-0x0000000006AFE000-memory.dmp

      Filesize

      5.0MB

    • memory/4160-707-0x0000000000400000-0x0000000001F60000-memory.dmp

      Filesize

      27.4MB

    • memory/4160-196-0x0000000006DE0000-0x0000000006E24000-memory.dmp

      Filesize

      272KB

    • memory/4160-676-0x0000000007FE0000-0x0000000007FFA000-memory.dmp

      Filesize

      104KB

    • memory/4160-677-0x0000000008040000-0x0000000008046000-memory.dmp

      Filesize

      24KB

    • memory/4160-679-0x0000000000400000-0x0000000001F60000-memory.dmp

      Filesize

      27.4MB

    • memory/4160-191-0x0000000000400000-0x0000000001F60000-memory.dmp

      Filesize

      27.4MB

    • memory/4160-192-0x0000000000400000-0x0000000001F60000-memory.dmp

      Filesize

      27.4MB

    • memory/4984-9-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

      Filesize

      64KB

    • memory/4984-10-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

      Filesize

      64KB

    • memory/4984-11-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

      Filesize

      64KB

    • memory/4984-14-0x00007FF838FD0000-0x00007FF838FE0000-memory.dmp

      Filesize

      64KB

    • memory/4984-15-0x00007FF838FD0000-0x00007FF838FE0000-memory.dmp

      Filesize

      64KB

    • memory/4984-8-0x00007FF83CB40000-0x00007FF83CB50000-memory.dmp

      Filesize

      64KB