Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-03-2021 21:16
Static task
static1
Behavioral task
behavioral1
Sample
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
Resource
win10v20201028
General
-
Target
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
-
Size
784KB
-
MD5
1d963f2296c5363f16dff1165cb8e413
-
SHA1
15f699a8a754a937081a27ab75d4a793b82993e6
-
SHA256
ed8a7ffec56f450a365e758012db092883bbd23565f3f9fbb004c189fb703de3
-
SHA512
a76bf1f1398800ee0a09088d42dc38ce2d42b66e24a8cb4c97f1c055702483193467b562740c808106fa813614425304993f16e9a101e1e8202deec4ef65e2be
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1324 updatewin.exe 2136 5.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 5.exe 2136 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3708 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\189211a5-3899-4f19-aea8-f304a83bbcd7\\ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe\" --AutoStart" ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.2ip.ua 8 api.2ip.ua 11 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2220 timeout.exe 2268 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2748 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 2136 5.exe 2136 5.exe 2136 5.exe 2136 5.exe 2136 5.exe 2136 5.exe 2136 5.exe 2136 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 412 wrote to memory of 3708 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 75 PID 412 wrote to memory of 3708 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 75 PID 412 wrote to memory of 3708 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 75 PID 412 wrote to memory of 3608 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 76 PID 412 wrote to memory of 3608 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 76 PID 412 wrote to memory of 3608 412 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 76 PID 3608 wrote to memory of 1324 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 78 PID 3608 wrote to memory of 1324 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 78 PID 3608 wrote to memory of 1324 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 78 PID 3608 wrote to memory of 2136 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 79 PID 3608 wrote to memory of 2136 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 79 PID 3608 wrote to memory of 2136 3608 ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe 79 PID 1324 wrote to memory of 3360 1324 updatewin.exe 81 PID 1324 wrote to memory of 3360 1324 updatewin.exe 81 PID 1324 wrote to memory of 3360 1324 updatewin.exe 81 PID 3360 wrote to memory of 2220 3360 cmd.exe 84 PID 3360 wrote to memory of 2220 3360 cmd.exe 84 PID 3360 wrote to memory of 2220 3360 cmd.exe 84 PID 2136 wrote to memory of 200 2136 5.exe 86 PID 2136 wrote to memory of 200 2136 5.exe 86 PID 2136 wrote to memory of 200 2136 5.exe 86 PID 200 wrote to memory of 2748 200 cmd.exe 88 PID 200 wrote to memory of 2748 200 cmd.exe 88 PID 200 wrote to memory of 2748 200 cmd.exe 88 PID 200 wrote to memory of 2268 200 cmd.exe 90 PID 200 wrote to memory of 2268 200 cmd.exe 90 PID 200 wrote to memory of 2268 200 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe"C:\Users\Admin\AppData\Local\Temp\ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\189211a5-3899-4f19-aea8-f304a83bbcd7" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe"C:\Users\Admin\AppData\Local\Temp\ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\updatewin.exe"C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\5.exe"C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\2f61fc79-6c97-412e-8d7d-9ad96872610c\5.exe" & del C:\ProgramData\*.dll & exit4⤵
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:2268
-
-
-
-