Analysis
-
max time kernel
97s -
max time network
84s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-08-2021 17:11
Static task
static1
Behavioral task
behavioral1
Sample
Parts enquiry.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Parts enquiry.exe
Resource
win10v20210408
General
-
Target
Parts enquiry.exe
-
Size
792KB
-
MD5
6a239782a002f49be71a6dfca139864c
-
SHA1
6609a8974b80600598a64149340bad3989ecf780
-
SHA256
722a5ea9b20e3a0b77f4f1628f763e46ccd4e87d284ac28997cec9874c479064
-
SHA512
700385b2854878c8897a9733ac1288a67dfaa33bfeeef4a18286acfaf46e65a08cb2daec606edaee5421565e4f93508d254ae0834d466328174404db340b3b4a
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
A310logger Executable 3 IoCs
resource yara_rule behavioral1/files/0x00030000000130cc-79.dat a310logger behavioral1/files/0x00030000000130cc-81.dat a310logger behavioral1/files/0x00030000000130cc-82.dat a310logger -
Executes dropped EXE 2 IoCs
pid Process 1244 InstallUtil.exe 788 Fox.exe -
Loads dropped DLL 2 IoCs
pid Process 980 Parts enquiry.exe 1244 InstallUtil.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\KPrrSC = "C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallUtil.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 980 set thread context of 1244 980 Parts enquiry.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 Parts enquiry.exe 980 Parts enquiry.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 980 Parts enquiry.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 980 wrote to memory of 1244 980 Parts enquiry.exe 29 PID 1244 wrote to memory of 788 1244 InstallUtil.exe 30 PID 1244 wrote to memory of 788 1244 InstallUtil.exe 30 PID 1244 wrote to memory of 788 1244 InstallUtil.exe 30 PID 1244 wrote to memory of 788 1244 InstallUtil.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Parts enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Parts enquiry.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe3⤵
- Executes dropped EXE
PID:788
-
-