Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-12-2020 07:47
Static task
static1
Behavioral task
behavioral1
Sample
313f90db50cc3d4164b90d648b83cd75.exe
Resource
win7v20201028
General
-
Target
313f90db50cc3d4164b90d648b83cd75.exe
-
Size
671KB
-
MD5
313f90db50cc3d4164b90d648b83cd75
-
SHA1
f861f285705a4eb7ef51de27baef8dae05c36e15
-
SHA256
69057a29d94d0ae3e51c435df396178b093d057db5addcdb273dcd5aedc6e1ef
-
SHA512
cb0acb7106a328a83848812e85d7f998e5c0ef0780b4f0c20ab33cf046053202c265c40d7f68ee156d2ad4f80c114529ef8d8e793302d45991337a5cf37d1546
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 4 IoCs
flow pid Process 34 3668 WScript.exe 36 3668 WScript.exe 38 3668 WScript.exe 40 3668 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2724 File2.exe 4012 lvfuk.exe 3012 6las.exe 3824 4ger.exe 1292 startveu.exe 3972 SmartClock.exe 3736 CL_Debug_Log.txt 3580 egctmpmrbo.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6las.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lvfuk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lvfuk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion startveu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion startveu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6las.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ger.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4ger.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine lvfuk.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine 6las.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine 4ger.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine startveu.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine SmartClock.exe -
Loads dropped DLL 3 IoCs
pid Process 2724 File2.exe 3516 rundll32.exe 3516 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3012 6las.exe 4012 lvfuk.exe 3824 4ger.exe 1292 startveu.exe 3972 SmartClock.exe -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000001ab53-44.dat autoit_exe behavioral2/files/0x000200000001ab55-49.dat autoit_exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\solfer\4ger.exe File2.exe File created C:\Program Files (x86)\solfer\6las.exe File2.exe File created C:\Program Files (x86)\solfer\startveu.exe File2.exe File created C:\Program Files (x86)\solfer\boleroh\msdasc.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\msorcl32.chm File2.exe File created C:\Program Files (x86)\solfer\boleroh\lvfuk.exe File2.exe File created C:\Program Files (x86)\solfer\wiatrace.log File2.exe File created C:\Program Files (x86)\solfer\Microsoft.IdentityServer.Web.Resources.dll File2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lvfuk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 313f90db50cc3d4164b90d648b83cd75.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 313f90db50cc3d4164b90d648b83cd75.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lvfuk.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 648 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4076 timeout.exe 3344 timeout.exe 4004 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3972 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3012 6las.exe 3012 6las.exe 4012 lvfuk.exe 4012 lvfuk.exe 3824 4ger.exe 3824 4ger.exe 1292 startveu.exe 1292 startveu.exe 3972 SmartClock.exe 3972 SmartClock.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3736 CL_Debug_Log.txt Token: 35 3736 CL_Debug_Log.txt Token: SeSecurityPrivilege 3736 CL_Debug_Log.txt Token: SeSecurityPrivilege 3736 CL_Debug_Log.txt -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4048 313f90db50cc3d4164b90d648b83cd75.exe 4048 313f90db50cc3d4164b90d648b83cd75.exe 1292 startveu.exe 1292 startveu.exe 1292 startveu.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1292 startveu.exe 1292 startveu.exe 1292 startveu.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2724 4048 313f90db50cc3d4164b90d648b83cd75.exe 78 PID 4048 wrote to memory of 2724 4048 313f90db50cc3d4164b90d648b83cd75.exe 78 PID 4048 wrote to memory of 2724 4048 313f90db50cc3d4164b90d648b83cd75.exe 78 PID 4048 wrote to memory of 3724 4048 313f90db50cc3d4164b90d648b83cd75.exe 79 PID 4048 wrote to memory of 3724 4048 313f90db50cc3d4164b90d648b83cd75.exe 79 PID 4048 wrote to memory of 3724 4048 313f90db50cc3d4164b90d648b83cd75.exe 79 PID 3724 wrote to memory of 4076 3724 cmd.exe 81 PID 3724 wrote to memory of 4076 3724 cmd.exe 81 PID 3724 wrote to memory of 4076 3724 cmd.exe 81 PID 2724 wrote to memory of 4012 2724 File2.exe 82 PID 2724 wrote to memory of 4012 2724 File2.exe 82 PID 2724 wrote to memory of 4012 2724 File2.exe 82 PID 2724 wrote to memory of 3012 2724 File2.exe 83 PID 2724 wrote to memory of 3012 2724 File2.exe 83 PID 2724 wrote to memory of 3012 2724 File2.exe 83 PID 2724 wrote to memory of 3824 2724 File2.exe 84 PID 2724 wrote to memory of 3824 2724 File2.exe 84 PID 2724 wrote to memory of 3824 2724 File2.exe 84 PID 2724 wrote to memory of 1292 2724 File2.exe 85 PID 2724 wrote to memory of 1292 2724 File2.exe 85 PID 2724 wrote to memory of 1292 2724 File2.exe 85 PID 3824 wrote to memory of 3972 3824 4ger.exe 86 PID 3824 wrote to memory of 3972 3824 4ger.exe 86 PID 3824 wrote to memory of 3972 3824 4ger.exe 86 PID 1292 wrote to memory of 3736 1292 startveu.exe 87 PID 1292 wrote to memory of 3736 1292 startveu.exe 87 PID 1292 wrote to memory of 3736 1292 startveu.exe 87 PID 1292 wrote to memory of 2088 1292 startveu.exe 89 PID 1292 wrote to memory of 2088 1292 startveu.exe 89 PID 1292 wrote to memory of 2088 1292 startveu.exe 89 PID 2088 wrote to memory of 648 2088 cmd.exe 91 PID 2088 wrote to memory of 648 2088 cmd.exe 91 PID 2088 wrote to memory of 648 2088 cmd.exe 91 PID 3012 wrote to memory of 2204 3012 6las.exe 92 PID 3012 wrote to memory of 2204 3012 6las.exe 92 PID 3012 wrote to memory of 2204 3012 6las.exe 92 PID 2204 wrote to memory of 3344 2204 cmd.exe 94 PID 2204 wrote to memory of 3344 2204 cmd.exe 94 PID 2204 wrote to memory of 3344 2204 cmd.exe 94 PID 3012 wrote to memory of 2312 3012 6las.exe 95 PID 3012 wrote to memory of 2312 3012 6las.exe 95 PID 3012 wrote to memory of 2312 3012 6las.exe 95 PID 2312 wrote to memory of 4004 2312 cmd.exe 97 PID 2312 wrote to memory of 4004 2312 cmd.exe 97 PID 2312 wrote to memory of 4004 2312 cmd.exe 97 PID 4012 wrote to memory of 3132 4012 lvfuk.exe 100 PID 4012 wrote to memory of 3132 4012 lvfuk.exe 100 PID 4012 wrote to memory of 3132 4012 lvfuk.exe 100 PID 3132 wrote to memory of 3580 3132 cmd.exe 102 PID 3132 wrote to memory of 3580 3132 cmd.exe 102 PID 3132 wrote to memory of 3580 3132 cmd.exe 102 PID 3580 wrote to memory of 3516 3580 egctmpmrbo.exe 103 PID 3580 wrote to memory of 3516 3580 egctmpmrbo.exe 103 PID 3580 wrote to memory of 3516 3580 egctmpmrbo.exe 103 PID 4012 wrote to memory of 1364 4012 lvfuk.exe 104 PID 4012 wrote to memory of 1364 4012 lvfuk.exe 104 PID 4012 wrote to memory of 1364 4012 lvfuk.exe 104 PID 1364 wrote to memory of 3668 1364 cmd.exe 106 PID 1364 wrote to memory of 3668 1364 cmd.exe 106 PID 1364 wrote to memory of 3668 1364 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\File2.exe"C:\Users\Admin\AppData\Local\Temp\File2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\solfer\boleroh\lvfuk.exe"C:\Program Files (x86)\solfer\boleroh\lvfuk.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\egctmpmrbo.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\egctmpmrbo.exe"C:\Users\Admin\AppData\Local\Temp\egctmpmrbo.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\EGCTMP~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\EGCTMP~1.EXE6⤵
- Loads dropped DLL
PID:3516
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\nviwklwlbmhl.vbs"4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\nviwklwlbmhl.vbs"5⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:3668
-
-
-
-
C:\Program Files (x86)\solfer\6las.exe"C:\Program Files (x86)\solfer\6las.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\owjhardlnins & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\owjhardlnins & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4004
-
-
-
-
C:\Program Files (x86)\solfer\4ger.exe"C:\Program Files (x86)\solfer\4ger.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
-
C:\Program Files (x86)\solfer\startveu.exe"C:\Program Files (x86)\solfer\startveu.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
PID:648
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\GWSltiL & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:4076
-
-