Analysis
-
max time kernel
70s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 14:55
Static task
static1
Behavioral task
behavioral1
Sample
Specifications_Details_20330_FLQ.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Specifications_Details_20330_FLQ.exe
Resource
win10v20210408
General
-
Target
Specifications_Details_20330_FLQ.exe
-
Size
799KB
-
MD5
edbb2066fd9539e279bf48077b755a40
-
SHA1
f914783d5d5aeeb95eda30a8c456624e471108a2
-
SHA256
41f206a7e8b3c15642e6cfad479ae3f0972b82e57ec46a5ffd31e51954a81c6c
-
SHA512
8c9fa977b79afbbe9a49f0bb3ee93479f4bb4b44211fac8c87beae2e8ca917c0c3be783ce6a0d1e268bf92b2ddd893454a86d13c95a732896206429e5cc98862
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\notepad\\notepad.exe\"" Specifications_Details_20330_FLQ.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 checkip.dyndns.org 18 freegeoip.app 19 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription pid process target process PID 740 set thread context of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Specifications_Details_20330_FLQ.exeSpecifications_Details_20330_FLQ.exepid process 740 Specifications_Details_20330_FLQ.exe 740 Specifications_Details_20330_FLQ.exe 1540 Specifications_Details_20330_FLQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Specifications_Details_20330_FLQ.exeSpecifications_Details_20330_FLQ.exedescription pid process Token: SeDebugPrivilege 740 Specifications_Details_20330_FLQ.exe Token: SeDebugPrivilege 1540 Specifications_Details_20330_FLQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Specifications_Details_20330_FLQ.exedescription pid process target process PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe PID 740 wrote to memory of 1540 740 Specifications_Details_20330_FLQ.exe Specifications_Details_20330_FLQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe"C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exeC:\Users\Admin\AppData\Local\Temp\Specifications_Details_20330_FLQ.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Specifications_Details_20330_FLQ.exe.log
MD59e7845217df4a635ec4341c3d52ed685
SHA1d65cb39d37392975b038ce503a585adadb805da5
SHA256d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b
SHA512307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1