Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-01-2021 12:01
Static task
static1
Behavioral task
behavioral1
Sample
5543.exe
Resource
win7v20201028
General
-
Target
5543.exe
-
Size
2.8MB
-
MD5
3667e43d85130fb90d07e4a725fe7b4a
-
SHA1
711dd470697df3e34ebcbf481ccc9852ac659bbe
-
SHA256
0beaf24e3a5b13f73b8ef67db0a52815b4948cbceea9a0e5159cfedd7ebb7462
-
SHA512
2ac9bed721e20b8a352ad41766b1b0eb79413b91d555bf942aaa6b66b47ef04f08a6594bbce649af95c09d7e1352a73db5120b8509a553b006544cdd7fb683db
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
5543.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5543.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5543.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5543.exepid process 1732 5543.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
5543.exepid process 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe 1732 5543.exe