Analysis
-
max time kernel
21s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-03-2021 12:10
Static task
static1
Behavioral task
behavioral1
Sample
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe
Resource
win7v20201028
General
-
Target
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe
-
Size
2.0MB
-
MD5
602c4fc857abdc65397927df41fc638d
-
SHA1
57dd28ad57e53751dbf68959a5a8fc4012d905a4
-
SHA256
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84
-
SHA512
c7da5aff57e4c125a4b42bf6a7e319509b9786fd673f4e3320ed0e2124cdf649ac4708ed2430bc7f550e2ba260383cf2a1099d0b4f9ac7ec6af3516c815d84ad
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exepid Process 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exedescription pid Process procid_target PID 700 set thread context of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3940 700 WerFault.exe 67 3396 1220 WerFault.exe 87 -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 3452 timeout.exe 728 timeout.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exeWerFault.exeWerFault.exepid Process 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe 3396 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exeWerFault.exeWerFault.exedescription pid Process Token: SeDebugPrivilege 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe Token: SeRestorePrivilege 3940 WerFault.exe Token: SeBackupPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 3396 WerFault.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.execmd.execmd.exedescription pid Process procid_target PID 700 wrote to memory of 3792 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 75 PID 700 wrote to memory of 3792 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 75 PID 700 wrote to memory of 3792 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 75 PID 3792 wrote to memory of 3452 3792 cmd.exe 77 PID 3792 wrote to memory of 3452 3792 cmd.exe 77 PID 3792 wrote to memory of 3452 3792 cmd.exe 77 PID 700 wrote to memory of 3992 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 80 PID 700 wrote to memory of 3992 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 80 PID 700 wrote to memory of 3992 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 80 PID 3992 wrote to memory of 728 3992 cmd.exe 82 PID 3992 wrote to memory of 728 3992 cmd.exe 82 PID 3992 wrote to memory of 728 3992 cmd.exe 82 PID 700 wrote to memory of 1912 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 83 PID 700 wrote to memory of 1912 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 83 PID 700 wrote to memory of 1912 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 83 PID 700 wrote to memory of 1536 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 85 PID 700 wrote to memory of 1536 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 85 PID 700 wrote to memory of 1536 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 85 PID 700 wrote to memory of 1540 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 84 PID 700 wrote to memory of 1540 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 84 PID 700 wrote to memory of 1540 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 84 PID 700 wrote to memory of 1112 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 86 PID 700 wrote to memory of 1112 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 86 PID 700 wrote to memory of 1112 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 86 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87 PID 700 wrote to memory of 1220 700 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c timeout 42⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:728
-
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 11883⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 14922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-