Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 09:29
Static task
static1
Behavioral task
behavioral1
Sample
main_setup_x86x64.bin.exe
Resource
win7v20210408
General
-
Target
main_setup_x86x64.bin.exe
-
Size
1.8MB
-
MD5
51da3eb43302642233928bd69ca6e219
-
SHA1
7d7d696126bde5e8dbab7382d278e40d22cf47da
-
SHA256
138a3dd2730be8b076caf28f85d3fbd5a987f9587c8b629ca565ac8de1cc9637
-
SHA512
6956d4a9331ad8b6cf563427c36ddf4981f1cdebd30ec8cdbc6ec2845e0f4762ed2c4d8d3285b0bcd18d698569d2067f58e9fa1e22d77d4be97efd97d1898561
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3032 Fresche.exe.com 1120 Fresche.exe.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Fresche.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Fresche.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3404 PING.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1120 Fresche.exe.com 1120 Fresche.exe.com -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3152 wrote to memory of 1372 3152 main_setup_x86x64.bin.exe 76 PID 3152 wrote to memory of 1372 3152 main_setup_x86x64.bin.exe 76 PID 3152 wrote to memory of 1372 3152 main_setup_x86x64.bin.exe 76 PID 3152 wrote to memory of 1832 3152 main_setup_x86x64.bin.exe 78 PID 3152 wrote to memory of 1832 3152 main_setup_x86x64.bin.exe 78 PID 3152 wrote to memory of 1832 3152 main_setup_x86x64.bin.exe 78 PID 1832 wrote to memory of 2332 1832 cmd.exe 80 PID 1832 wrote to memory of 2332 1832 cmd.exe 80 PID 1832 wrote to memory of 2332 1832 cmd.exe 80 PID 2332 wrote to memory of 3792 2332 cmd.exe 81 PID 2332 wrote to memory of 3792 2332 cmd.exe 81 PID 2332 wrote to memory of 3792 2332 cmd.exe 81 PID 2332 wrote to memory of 3032 2332 cmd.exe 82 PID 2332 wrote to memory of 3032 2332 cmd.exe 82 PID 2332 wrote to memory of 3032 2332 cmd.exe 82 PID 2332 wrote to memory of 3404 2332 cmd.exe 83 PID 2332 wrote to memory of 3404 2332 cmd.exe 83 PID 2332 wrote to memory of 3404 2332 cmd.exe 83 PID 3032 wrote to memory of 1120 3032 Fresche.exe.com 84 PID 3032 wrote to memory of 1120 3032 Fresche.exe.com 84 PID 3032 wrote to memory of 1120 3032 Fresche.exe.com 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.bin.exe"C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\makecab.exe"C:\Windows\System32\makecab.exe"2⤵PID:1372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mtGCHFXHhSVuwQmJLT & EmCeqebftHqwLnhIhSxEfgLn & cmd < Cui.jar2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^PGjCsNUUOkulVUDgTCsLgwbtgnrtaMjQyMxswDFobKDrInIVqUHEnjBNoihSKQBwYdtpmkjfXohDnxcQQitnyHsSkGpTfMbHpBtszncOHsHdZXfOMbeCLrWsZkXTezZlKGxWfrv$" Sete.jar4⤵PID:3792
-
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.comFresche.exe.com d4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.comC:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.com d5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:1120
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:3404
-
-
-