Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-03-2021 05:41
Static task
static1
Behavioral task
behavioral1
Sample
fda422a54b108ec592b499e0dc59e6c6.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
fda422a54b108ec592b499e0dc59e6c6.exe
Resource
win10v20201028
General
-
Target
fda422a54b108ec592b499e0dc59e6c6.exe
-
Size
704KB
-
MD5
fda422a54b108ec592b499e0dc59e6c6
-
SHA1
8ee655935d7620a6d2f18f26d0532f9dfa8b56e8
-
SHA256
0e55e17532909ad5ad34eb4e35d791b27c6951dd15a8baba34c29ae572c884d0
-
SHA512
11a8e56836af1b1b86dbea68fc570535d2f74266fecda6fa9e6f90431d9596740632a35fa0ca86d8b9f58706425f3ecda2dc572f3c47bf7e2323c02f43ead52e
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2072 updatewin.exe 3880 5.exe -
Loads dropped DLL 2 IoCs
pid Process 3880 5.exe 3880 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1232 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a9773302-c76d-41ac-9415-e41388c41e40\\fda422a54b108ec592b499e0dc59e6c6.exe\" --AutoStart" fda422a54b108ec592b499e0dc59e6c6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.2ip.ua 10 api.2ip.ua 20 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3896 timeout.exe 764 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2488 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 fda422a54b108ec592b499e0dc59e6c6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e fda422a54b108ec592b499e0dc59e6c6.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4040 fda422a54b108ec592b499e0dc59e6c6.exe 4040 fda422a54b108ec592b499e0dc59e6c6.exe 3060 fda422a54b108ec592b499e0dc59e6c6.exe 3060 fda422a54b108ec592b499e0dc59e6c6.exe 3880 5.exe 3880 5.exe 3880 5.exe 3880 5.exe 3880 5.exe 3880 5.exe 3880 5.exe 3880 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1232 4040 fda422a54b108ec592b499e0dc59e6c6.exe 75 PID 4040 wrote to memory of 1232 4040 fda422a54b108ec592b499e0dc59e6c6.exe 75 PID 4040 wrote to memory of 1232 4040 fda422a54b108ec592b499e0dc59e6c6.exe 75 PID 4040 wrote to memory of 3060 4040 fda422a54b108ec592b499e0dc59e6c6.exe 76 PID 4040 wrote to memory of 3060 4040 fda422a54b108ec592b499e0dc59e6c6.exe 76 PID 4040 wrote to memory of 3060 4040 fda422a54b108ec592b499e0dc59e6c6.exe 76 PID 3060 wrote to memory of 2072 3060 fda422a54b108ec592b499e0dc59e6c6.exe 80 PID 3060 wrote to memory of 2072 3060 fda422a54b108ec592b499e0dc59e6c6.exe 80 PID 3060 wrote to memory of 2072 3060 fda422a54b108ec592b499e0dc59e6c6.exe 80 PID 3060 wrote to memory of 3880 3060 fda422a54b108ec592b499e0dc59e6c6.exe 81 PID 3060 wrote to memory of 3880 3060 fda422a54b108ec592b499e0dc59e6c6.exe 81 PID 3060 wrote to memory of 3880 3060 fda422a54b108ec592b499e0dc59e6c6.exe 81 PID 2072 wrote to memory of 732 2072 updatewin.exe 83 PID 2072 wrote to memory of 732 2072 updatewin.exe 83 PID 2072 wrote to memory of 732 2072 updatewin.exe 83 PID 732 wrote to memory of 3896 732 cmd.exe 85 PID 732 wrote to memory of 3896 732 cmd.exe 85 PID 732 wrote to memory of 3896 732 cmd.exe 85 PID 3880 wrote to memory of 2484 3880 5.exe 86 PID 3880 wrote to memory of 2484 3880 5.exe 86 PID 3880 wrote to memory of 2484 3880 5.exe 86 PID 2484 wrote to memory of 2488 2484 cmd.exe 88 PID 2484 wrote to memory of 2488 2484 cmd.exe 88 PID 2484 wrote to memory of 2488 2484 cmd.exe 88 PID 2484 wrote to memory of 764 2484 cmd.exe 89 PID 2484 wrote to memory of 764 2484 cmd.exe 89 PID 2484 wrote to memory of 764 2484 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda422a54b108ec592b499e0dc59e6c6.exe"C:\Users\Admin\AppData\Local\Temp\fda422a54b108ec592b499e0dc59e6c6.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a9773302-c76d-41ac-9415-e41388c41e40" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\fda422a54b108ec592b499e0dc59e6c6.exe"C:\Users\Admin\AppData\Local\Temp\fda422a54b108ec592b499e0dc59e6c6.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\updatewin.exe"C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:3896
-
-
-
-
C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\5.exe"C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\f09a83d7-e522-463d-86a4-2924f39ef0db\5.exe" & del C:\ProgramData\*.dll & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:764
-
-
-
-