Analysis
-
max time kernel
116s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
02-07-2021 23:45
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-221526(1).exe
Resource
win7v20210410
General
-
Target
usfive_20210702-221526(1).exe
-
Size
477KB
-
MD5
5e5889d84bf78a8fb99dc88107a5745a
-
SHA1
0865c8e5d321fa815b08790646f1abc1a260e329
-
SHA256
5a5eed8af89a4796322c80832db0389085bee3d7352c19e094c2aefb861363f8
-
SHA512
6fd715bdddc63f92b649c47805c5081f67b9b4118c509d52106bf33e94354abd0d6a408cdec30f92bcc116eeea4a07d6b7fd55d62df744071dfbc3b829cf058f
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2408 created 1096 2408 WerFault.exe 77 -
DarkVNC Payload 3 IoCs
resource yara_rule behavioral2/memory/1096-129-0x0000000000400000-0x0000000000612000-memory.dmp darkvnc behavioral2/memory/1096-128-0x0000000000B30000-0x0000000000BB8000-memory.dmp darkvnc behavioral2/memory/3264-131-0x000001EC01390000-0x000001EC0145A000-memory.dmp darkvnc -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1096 e5aJkF5jMv.exe -
Loads dropped DLL 6 IoCs
pid Process 4064 usfive_20210702-221526(1).exe 4064 usfive_20210702-221526(1).exe 4064 usfive_20210702-221526(1).exe 4064 usfive_20210702-221526(1).exe 4064 usfive_20210702-221526(1).exe 4064 usfive_20210702-221526(1).exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 3264 1096 e5aJkF5jMv.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2408 1096 WerFault.exe 77 -
Delays execution with timeout.exe 1 IoCs
pid Process 2152 timeout.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1096 e5aJkF5jMv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2408 WerFault.exe Token: SeBackupPrivilege 2408 WerFault.exe Token: SeDebugPrivilege 2408 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4064 wrote to memory of 1096 4064 usfive_20210702-221526(1).exe 77 PID 4064 wrote to memory of 1096 4064 usfive_20210702-221526(1).exe 77 PID 4064 wrote to memory of 1096 4064 usfive_20210702-221526(1).exe 77 PID 4064 wrote to memory of 3940 4064 usfive_20210702-221526(1).exe 78 PID 4064 wrote to memory of 3940 4064 usfive_20210702-221526(1).exe 78 PID 4064 wrote to memory of 3940 4064 usfive_20210702-221526(1).exe 78 PID 3940 wrote to memory of 2152 3940 cmd.exe 80 PID 3940 wrote to memory of 2152 3940 cmd.exe 80 PID 3940 wrote to memory of 2152 3940 cmd.exe 80 PID 1096 wrote to memory of 3264 1096 e5aJkF5jMv.exe 81 PID 1096 wrote to memory of 3264 1096 e5aJkF5jMv.exe 81 PID 1096 wrote to memory of 3264 1096 e5aJkF5jMv.exe 81 PID 1096 wrote to memory of 3264 1096 e5aJkF5jMv.exe 81 PID 1096 wrote to memory of 3264 1096 e5aJkF5jMv.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\usfive_20210702-221526(1).exe"C:\Users\Admin\AppData\Local\Temp\usfive_20210702-221526(1).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\e5aJkF5jMv.exe"C:\Users\Admin\AppData\Local\Temp\e5aJkF5jMv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe3⤵PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 4843⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\usfive_20210702-221526(1).exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2152
-
-