Analysis
-
max time kernel
68s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-03-2021 13:55
Static task
static1
Behavioral task
behavioral1
Sample
839609b011f03a293a0573ea5fb1277e.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
839609b011f03a293a0573ea5fb1277e.exe
Resource
win10v20201028
General
-
Target
839609b011f03a293a0573ea5fb1277e.exe
-
Size
698KB
-
MD5
839609b011f03a293a0573ea5fb1277e
-
SHA1
fe48ac0a84e79bc2dd0024e55a62e86b077f8c12
-
SHA256
d466ef9698569363af4f08b64235817c7838c726c1faee300582aab3d90f5683
-
SHA512
526f6345e367950bc775213663fd68bd7bae2b82c71df70e8589dccc173da66af0171183c4abc4a102e45e151453ff8a8d67c2e4c8fcf72c54d85def22d37ac4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3804 updatewin.exe 804 5.exe -
Loads dropped DLL 2 IoCs
pid Process 804 5.exe 804 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3692 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2ea30b19-c3d4-490d-a4eb-d21bbd8d28f3\\839609b011f03a293a0573ea5fb1277e.exe\" --AutoStart" 839609b011f03a293a0573ea5fb1277e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.2ip.ua 11 api.2ip.ua 20 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3580 timeout.exe 2200 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3256 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 839609b011f03a293a0573ea5fb1277e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 839609b011f03a293a0573ea5fb1277e.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 576 839609b011f03a293a0573ea5fb1277e.exe 576 839609b011f03a293a0573ea5fb1277e.exe 2536 839609b011f03a293a0573ea5fb1277e.exe 2536 839609b011f03a293a0573ea5fb1277e.exe 804 5.exe 804 5.exe 804 5.exe 804 5.exe 804 5.exe 804 5.exe 804 5.exe 804 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3256 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 576 wrote to memory of 3692 576 839609b011f03a293a0573ea5fb1277e.exe 75 PID 576 wrote to memory of 3692 576 839609b011f03a293a0573ea5fb1277e.exe 75 PID 576 wrote to memory of 3692 576 839609b011f03a293a0573ea5fb1277e.exe 75 PID 576 wrote to memory of 2536 576 839609b011f03a293a0573ea5fb1277e.exe 76 PID 576 wrote to memory of 2536 576 839609b011f03a293a0573ea5fb1277e.exe 76 PID 576 wrote to memory of 2536 576 839609b011f03a293a0573ea5fb1277e.exe 76 PID 2536 wrote to memory of 3804 2536 839609b011f03a293a0573ea5fb1277e.exe 81 PID 2536 wrote to memory of 3804 2536 839609b011f03a293a0573ea5fb1277e.exe 81 PID 2536 wrote to memory of 3804 2536 839609b011f03a293a0573ea5fb1277e.exe 81 PID 2536 wrote to memory of 804 2536 839609b011f03a293a0573ea5fb1277e.exe 82 PID 2536 wrote to memory of 804 2536 839609b011f03a293a0573ea5fb1277e.exe 82 PID 2536 wrote to memory of 804 2536 839609b011f03a293a0573ea5fb1277e.exe 82 PID 3804 wrote to memory of 1676 3804 updatewin.exe 83 PID 3804 wrote to memory of 1676 3804 updatewin.exe 83 PID 3804 wrote to memory of 1676 3804 updatewin.exe 83 PID 1676 wrote to memory of 3580 1676 cmd.exe 85 PID 1676 wrote to memory of 3580 1676 cmd.exe 85 PID 1676 wrote to memory of 3580 1676 cmd.exe 85 PID 804 wrote to memory of 3152 804 5.exe 86 PID 804 wrote to memory of 3152 804 5.exe 86 PID 804 wrote to memory of 3152 804 5.exe 86 PID 3152 wrote to memory of 3256 3152 cmd.exe 88 PID 3152 wrote to memory of 3256 3152 cmd.exe 88 PID 3152 wrote to memory of 3256 3152 cmd.exe 88 PID 3152 wrote to memory of 2200 3152 cmd.exe 89 PID 3152 wrote to memory of 2200 3152 cmd.exe 89 PID 3152 wrote to memory of 2200 3152 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\839609b011f03a293a0573ea5fb1277e.exe"C:\Users\Admin\AppData\Local\Temp\839609b011f03a293a0573ea5fb1277e.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2ea30b19-c3d4-490d-a4eb-d21bbd8d28f3" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\839609b011f03a293a0573ea5fb1277e.exe"C:\Users\Admin\AppData\Local\Temp\839609b011f03a293a0573ea5fb1277e.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\updatewin.exe"C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:3580
-
-
-
-
C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\5.exe"C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\45e03688-dd90-48a3-8e98-785171e18e39\5.exe" & del C:\ProgramData\*.dll & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:2200
-
-
-
-