Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-08-2021 17:11
Static task
static1
Behavioral task
behavioral1
Sample
Parts enquiry.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Parts enquiry.exe
Resource
win10v20210408
General
-
Target
Parts enquiry.exe
-
Size
792KB
-
MD5
6a239782a002f49be71a6dfca139864c
-
SHA1
6609a8974b80600598a64149340bad3989ecf780
-
SHA256
722a5ea9b20e3a0b77f4f1628f763e46ccd4e87d284ac28997cec9874c479064
-
SHA512
700385b2854878c8897a9733ac1288a67dfaa33bfeeef4a18286acfaf46e65a08cb2daec606edaee5421565e4f93508d254ae0834d466328174404db340b3b4a
Malware Config
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab54-136.dat a310logger behavioral2/files/0x000100000001ab54-137.dat a310logger -
Executes dropped EXE 3 IoCs
pid Process 3428 InstallUtil.exe 688 InstallUtil.exe 2124 Fox.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\KPrrSC = "C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallUtil.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 632 set thread context of 688 632 Parts enquiry.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 632 Parts enquiry.exe 632 Parts enquiry.exe 632 Parts enquiry.exe 632 Parts enquiry.exe 632 Parts enquiry.exe 632 Parts enquiry.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 688 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 632 Parts enquiry.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 688 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 688 InstallUtil.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 632 wrote to memory of 3428 632 Parts enquiry.exe 78 PID 632 wrote to memory of 3428 632 Parts enquiry.exe 78 PID 632 wrote to memory of 3428 632 Parts enquiry.exe 78 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 632 wrote to memory of 688 632 Parts enquiry.exe 79 PID 688 wrote to memory of 2124 688 InstallUtil.exe 80 PID 688 wrote to memory of 2124 688 InstallUtil.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Parts enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Parts enquiry.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe2⤵
- Executes dropped EXE
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe3⤵
- Executes dropped EXE
PID:2124
-
-