Overview
overview
10Static
static
10Fri191454c4b4.exe
windows7_x64
8Fri191454c4b4.exe
windows10_x64
8Fri1921f7a9d3.exe
windows7_x64
10Fri1921f7a9d3.exe
windows10_x64
10Fri192902b3c24.exe
windows7_x64
10Fri192902b3c24.exe
windows10_x64
10Fri192b9eeaa03b.exe
windows7_x64
10Fri192b9eeaa03b.exe
windows10_x64
10Fri192c305b4a.exe
windows7_x64
10Fri192c305b4a.exe
windows10_x64
10Fri192f077...dd.exe
windows7_x64
10Fri192f077...dd.exe
windows10_x64
10Fri195cd4d...97.exe
windows7_x64
10Fri195cd4d...97.exe
windows10_x64
10Fri19870e2...44.exe
windows7_x64
10Fri19870e2...44.exe
windows10_x64
10Fri19927b4...d1.exe
windows7_x64
10Fri19927b4...d1.exe
windows10_x64
10Fri19ca03f05489b.exe
windows7_x64
6Fri19ca03f05489b.exe
windows10_x64
6Fri19d30056588.exe
windows7_x64
10Fri19d30056588.exe
windows10_x64
10libcurl.dll
windows7_x64
3libcurl.dll
windows10_x64
3libcurlpp.dll
windows7_x64
libcurlpp.dll
windows10_x64
3libgcc_s_dw2-1.dll
windows7_x64
libgcc_s_dw2-1.dll
windows10_x64
3libstdc++-6.dll
windows7_x64
3libstdc++-6.dll
windows10_x64
3libwinpthread-1.dll
windows7_x64
1libwinpthread-1.dll
windows10_x64
1Analysis
-
max time kernel
144s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10-09-2021 21:28
Behavioral task
behavioral1
Sample
Fri191454c4b4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Fri191454c4b4.exe
Resource
win10-en
Behavioral task
behavioral3
Sample
Fri1921f7a9d3.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Fri1921f7a9d3.exe
Resource
win10-en
Behavioral task
behavioral5
Sample
Fri192902b3c24.exe
Resource
win7-en
Behavioral task
behavioral6
Sample
Fri192902b3c24.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Fri192b9eeaa03b.exe
Resource
win7-en
Behavioral task
behavioral8
Sample
Fri192b9eeaa03b.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Fri192c305b4a.exe
Resource
win7-en
Behavioral task
behavioral10
Sample
Fri192c305b4a.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Fri192f077acf656dd.exe
Resource
win7-en
Behavioral task
behavioral12
Sample
Fri192f077acf656dd.exe
Resource
win10-en
Behavioral task
behavioral13
Sample
Fri195cd4dbfdf37897.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Fri195cd4dbfdf37897.exe
Resource
win10-en
Behavioral task
behavioral15
Sample
Fri19870e2febf5544.exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
Fri19870e2febf5544.exe
Resource
win10-en
Behavioral task
behavioral17
Sample
Fri19927b4fe38a9d1.exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
Fri19927b4fe38a9d1.exe
Resource
win10-en
Behavioral task
behavioral19
Sample
Fri19ca03f05489b.exe
Resource
win7-en
Behavioral task
behavioral20
Sample
Fri19ca03f05489b.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Fri19d30056588.exe
Resource
win7-en
Behavioral task
behavioral22
Sample
Fri19d30056588.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
libcurl.dll
Resource
win7-en
Behavioral task
behavioral24
Sample
libcurl.dll
Resource
win10v20210408
Behavioral task
behavioral25
Sample
libcurlpp.dll
Resource
win7-en
Behavioral task
behavioral26
Sample
libcurlpp.dll
Resource
win10v20210408
Behavioral task
behavioral27
Sample
libgcc_s_dw2-1.dll
Resource
win7-en
Behavioral task
behavioral28
Sample
libgcc_s_dw2-1.dll
Resource
win10-en
Behavioral task
behavioral29
Sample
libstdc++-6.dll
Resource
win7v20210408
Behavioral task
behavioral30
Sample
libstdc++-6.dll
Resource
win10-en
Behavioral task
behavioral31
Sample
libwinpthread-1.dll
Resource
win7v20210408
Behavioral task
behavioral32
Sample
libwinpthread-1.dll
Resource
win10-en
General
-
Target
Fri191454c4b4.exe
-
Size
151KB
-
MD5
7c8489d12be3a8b7c8d0a1cec55e2c34
-
SHA1
01d47c6e6809392ee6c85f3204d43b4dc5e83544
-
SHA256
6e5c3d18da03948721f6a66c441990b099f5f9abec0ab8a0ebe7aa9b83fad784
-
SHA512
83381a04e2ed42f0098f4d37592811aea0ad37e6fb0d6a5b8ba05563bf51ac229f5626fdc9a63ef3edbd1ef9d30948c8227a139c2abeabf11cdbced01cfc2f64
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
2541084.exe3967917.exe8780876.exeWinHoster.exepid process 1588 2541084.exe 1176 3967917.exe 1092 8780876.exe 1012 WinHoster.exe -
Loads dropped DLL 6 IoCs
Processes:
3967917.exeWerFault.exepid process 1176 3967917.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3967917.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3967917.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1988 1588 WerFault.exe 2541084.exe 1360 1092 WerFault.exe 8780876.exe -
Processes:
Fri191454c4b4.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Fri191454c4b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Fri191454c4b4.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
2541084.exeWerFault.exe8780876.exeWerFault.exepid process 1588 2541084.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 1092 8780876.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
WerFault.exeWerFault.exepid process 1988 WerFault.exe 1360 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Fri191454c4b4.exe2541084.exe8780876.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1836 Fri191454c4b4.exe Token: SeDebugPrivilege 1588 2541084.exe Token: SeDebugPrivilege 1092 8780876.exe Token: SeDebugPrivilege 1988 WerFault.exe Token: SeDebugPrivilege 1360 WerFault.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
Fri191454c4b4.exe3967917.exe2541084.exe8780876.exedescription pid process target process PID 1836 wrote to memory of 1588 1836 Fri191454c4b4.exe 2541084.exe PID 1836 wrote to memory of 1588 1836 Fri191454c4b4.exe 2541084.exe PID 1836 wrote to memory of 1588 1836 Fri191454c4b4.exe 2541084.exe PID 1836 wrote to memory of 1176 1836 Fri191454c4b4.exe 3967917.exe PID 1836 wrote to memory of 1176 1836 Fri191454c4b4.exe 3967917.exe PID 1836 wrote to memory of 1176 1836 Fri191454c4b4.exe 3967917.exe PID 1836 wrote to memory of 1176 1836 Fri191454c4b4.exe 3967917.exe PID 1836 wrote to memory of 1092 1836 Fri191454c4b4.exe 8780876.exe PID 1836 wrote to memory of 1092 1836 Fri191454c4b4.exe 8780876.exe PID 1836 wrote to memory of 1092 1836 Fri191454c4b4.exe 8780876.exe PID 1836 wrote to memory of 1092 1836 Fri191454c4b4.exe 8780876.exe PID 1176 wrote to memory of 1012 1176 3967917.exe WinHoster.exe PID 1176 wrote to memory of 1012 1176 3967917.exe WinHoster.exe PID 1176 wrote to memory of 1012 1176 3967917.exe WinHoster.exe PID 1176 wrote to memory of 1012 1176 3967917.exe WinHoster.exe PID 1588 wrote to memory of 1988 1588 2541084.exe WerFault.exe PID 1588 wrote to memory of 1988 1588 2541084.exe WerFault.exe PID 1588 wrote to memory of 1988 1588 2541084.exe WerFault.exe PID 1092 wrote to memory of 1360 1092 8780876.exe WerFault.exe PID 1092 wrote to memory of 1360 1092 8780876.exe WerFault.exe PID 1092 wrote to memory of 1360 1092 8780876.exe WerFault.exe PID 1092 wrote to memory of 1360 1092 8780876.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri191454c4b4.exe"C:\Users\Admin\AppData\Local\Temp\Fri191454c4b4.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\2541084.exe"C:\ProgramData\2541084.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1588 -s 18563⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\3967917.exe"C:\ProgramData\3967917.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\ProgramData\8780876.exe"C:\ProgramData\8780876.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 18523⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\2541084.exeMD5
05213c90ae83f9a9721ec8556d989b3f
SHA16b08770d890d232fa912b4fbc3a18b7a69afa006
SHA2563d4e9dcaedad519133be041dd9dc02d6ba9aa241a2f4ebc90bcf21147d5d5a9d
SHA5121ff033fa4787ccdd1ffe2d97f1475597abe1a7af97076fa7ef09f370e54d3bac333530055048fa6272c3afef2ba57b63c219c99155483a4885ae1ffe823f2d0d
-
C:\ProgramData\2541084.exeMD5
05213c90ae83f9a9721ec8556d989b3f
SHA16b08770d890d232fa912b4fbc3a18b7a69afa006
SHA2563d4e9dcaedad519133be041dd9dc02d6ba9aa241a2f4ebc90bcf21147d5d5a9d
SHA5121ff033fa4787ccdd1ffe2d97f1475597abe1a7af97076fa7ef09f370e54d3bac333530055048fa6272c3afef2ba57b63c219c99155483a4885ae1ffe823f2d0d
-
C:\ProgramData\3967917.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\ProgramData\3967917.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
C:\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
\ProgramData\8780876.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
memory/1012-96-0x0000000001060000-0x0000000001061000-memory.dmpFilesize
4KB
-
memory/1012-93-0x0000000000000000-mapping.dmp
-
memory/1012-101-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/1092-86-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/1092-78-0x0000000000000000-mapping.dmp
-
memory/1092-81-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/1092-88-0x0000000000880000-0x00000000008B7000-memory.dmpFilesize
220KB
-
memory/1092-89-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/1092-91-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/1176-82-0x0000000001170000-0x0000000001171000-memory.dmpFilesize
4KB
-
memory/1176-85-0x00000000004C0000-0x00000000004C1000-memory.dmpFilesize
4KB
-
memory/1176-87-0x00000000004D0000-0x00000000004DC000-memory.dmpFilesize
48KB
-
memory/1176-90-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/1176-74-0x0000000000000000-mapping.dmp
-
memory/1360-111-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/1360-105-0x0000000000000000-mapping.dmp
-
memory/1588-73-0x0000000000480000-0x0000000000481000-memory.dmpFilesize
4KB
-
memory/1588-77-0x000000001AE10000-0x000000001AE12000-memory.dmpFilesize
8KB
-
memory/1588-71-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1588-69-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/1588-72-0x0000000000450000-0x0000000000480000-memory.dmpFilesize
192KB
-
memory/1588-66-0x0000000000000000-mapping.dmp
-
memory/1836-64-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1836-65-0x000000001AE10000-0x000000001AE12000-memory.dmpFilesize
8KB
-
memory/1836-63-0x0000000000280000-0x000000000029C000-memory.dmpFilesize
112KB
-
memory/1836-62-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1836-60-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/1988-104-0x0000000002170000-0x0000000002171000-memory.dmpFilesize
4KB
-
memory/1988-103-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmpFilesize
8KB
-
memory/1988-102-0x0000000000000000-mapping.dmp