Analysis
-
max time kernel
67s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-03-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
dubi.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
dubi.exe
Resource
win10v20201028
General
-
Target
dubi.exe
-
Size
698KB
-
MD5
839609b011f03a293a0573ea5fb1277e
-
SHA1
fe48ac0a84e79bc2dd0024e55a62e86b077f8c12
-
SHA256
d466ef9698569363af4f08b64235817c7838c726c1faee300582aab3d90f5683
-
SHA512
526f6345e367950bc775213663fd68bd7bae2b82c71df70e8589dccc173da66af0171183c4abc4a102e45e151453ff8a8d67c2e4c8fcf72c54d85def22d37ac4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1904 updatewin.exe 1504 5.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 5.exe 1504 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2568 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\556e4a1b-f0ae-42e9-bae4-cb4ebcfa510d\\dubi.exe\" --AutoStart" dubi.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 api.2ip.ua 12 api.2ip.ua 21 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2976 timeout.exe 1508 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3604 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 dubi.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 dubi.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 728 dubi.exe 728 dubi.exe 576 dubi.exe 576 dubi.exe 1504 5.exe 1504 5.exe 1504 5.exe 1504 5.exe 1504 5.exe 1504 5.exe 1504 5.exe 1504 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3604 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 728 wrote to memory of 2568 728 dubi.exe 75 PID 728 wrote to memory of 2568 728 dubi.exe 75 PID 728 wrote to memory of 2568 728 dubi.exe 75 PID 728 wrote to memory of 576 728 dubi.exe 76 PID 728 wrote to memory of 576 728 dubi.exe 76 PID 728 wrote to memory of 576 728 dubi.exe 76 PID 576 wrote to memory of 1904 576 dubi.exe 80 PID 576 wrote to memory of 1904 576 dubi.exe 80 PID 576 wrote to memory of 1904 576 dubi.exe 80 PID 576 wrote to memory of 1504 576 dubi.exe 81 PID 576 wrote to memory of 1504 576 dubi.exe 81 PID 576 wrote to memory of 1504 576 dubi.exe 81 PID 1904 wrote to memory of 2900 1904 updatewin.exe 83 PID 1904 wrote to memory of 2900 1904 updatewin.exe 83 PID 1904 wrote to memory of 2900 1904 updatewin.exe 83 PID 2900 wrote to memory of 2976 2900 cmd.exe 85 PID 2900 wrote to memory of 2976 2900 cmd.exe 85 PID 2900 wrote to memory of 2976 2900 cmd.exe 85 PID 1504 wrote to memory of 1840 1504 5.exe 86 PID 1504 wrote to memory of 1840 1504 5.exe 86 PID 1504 wrote to memory of 1840 1504 5.exe 86 PID 1840 wrote to memory of 3604 1840 cmd.exe 88 PID 1840 wrote to memory of 3604 1840 cmd.exe 88 PID 1840 wrote to memory of 3604 1840 cmd.exe 88 PID 1840 wrote to memory of 1508 1840 cmd.exe 89 PID 1840 wrote to memory of 1508 1840 cmd.exe 89 PID 1840 wrote to memory of 1508 1840 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dubi.exe"C:\Users\Admin\AppData\Local\Temp\dubi.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\556e4a1b-f0ae-42e9-bae4-cb4ebcfa510d" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\dubi.exe"C:\Users\Admin\AppData\Local\Temp\dubi.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\updatewin.exe"C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:2976
-
-
-
-
C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\5.exe"C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\34290c94-8201-4e5a-8cc2-25c5d973227a\5.exe" & del C:\ProgramData\*.dll & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1508
-
-
-
-