Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 19:40
Static task
static1
General
-
Target
c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe
-
Size
71KB
-
MD5
b4479eaf03634d01b29504d10d756c2b
-
SHA1
15117264212dd79ca5a7cb1a180c2f4cf8337fa4
-
SHA256
c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823
-
SHA512
856ce50c03f5fcc1ed8d9f01f9f436fe61950a85ec39e2e48db1e4a0206d7103b3e8f03b064859dfaabee8f04a0f977500283eaa493363a7bd32861febd3f05f
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
7639770.scr6051877.scr2039295.scrWinHoster.exe2432216.scr4805325.scr1210827.scrpid process 2904 7639770.scr 3772 6051877.scr 532 2039295.scr 1268 WinHoster.exe 3644 2432216.scr 1792 4805325.scr 1696 1210827.scr -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2039295.scr2432216.scr4805325.scrdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2039295.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2432216.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2432216.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4805325.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4805325.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2039295.scr -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\2039295.scr themida behavioral1/memory/532-151-0x0000000000170000-0x0000000000171000-memory.dmp themida C:\Users\Admin\AppData\Roaming\2432216.scr themida behavioral1/memory/3644-164-0x0000000000D40000-0x0000000000D41000-memory.dmp themida C:\Users\Admin\AppData\Roaming\4805325.scr themida behavioral1/memory/1792-182-0x0000000000D60000-0x0000000000D61000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6051877.scrdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6051877.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2039295.scr2432216.scr4805325.scrdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2039295.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2432216.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4805325.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
2039295.scr2432216.scr4805325.scrpid process 532 2039295.scr 3644 2432216.scr 1792 4805325.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
7639770.scr2039295.scr2432216.scr4805325.scr1210827.scrpid process 2904 7639770.scr 532 2039295.scr 532 2039295.scr 3644 2432216.scr 3644 2432216.scr 1792 4805325.scr 1792 4805325.scr 1696 1210827.scr 532 2039295.scr 3644 2432216.scr 1792 4805325.scr 1792 4805325.scr -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe7639770.scr1210827.scr2039295.scr2432216.scr4805325.scrdescription pid process Token: SeDebugPrivilege 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe Token: SeDebugPrivilege 2904 7639770.scr Token: SeDebugPrivilege 1696 1210827.scr Token: SeDebugPrivilege 532 2039295.scr Token: SeDebugPrivilege 3644 2432216.scr Token: SeDebugPrivilege 1792 4805325.scr -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe6051877.scrdescription pid process target process PID 2372 wrote to memory of 2904 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 7639770.scr PID 2372 wrote to memory of 2904 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 7639770.scr PID 2372 wrote to memory of 2904 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 7639770.scr PID 2372 wrote to memory of 3772 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 6051877.scr PID 2372 wrote to memory of 3772 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 6051877.scr PID 2372 wrote to memory of 3772 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 6051877.scr PID 2372 wrote to memory of 532 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2039295.scr PID 2372 wrote to memory of 532 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2039295.scr PID 2372 wrote to memory of 532 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2039295.scr PID 3772 wrote to memory of 1268 3772 6051877.scr WinHoster.exe PID 3772 wrote to memory of 1268 3772 6051877.scr WinHoster.exe PID 3772 wrote to memory of 1268 3772 6051877.scr WinHoster.exe PID 2372 wrote to memory of 3644 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2432216.scr PID 2372 wrote to memory of 3644 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2432216.scr PID 2372 wrote to memory of 3644 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 2432216.scr PID 2372 wrote to memory of 1792 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 4805325.scr PID 2372 wrote to memory of 1792 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 4805325.scr PID 2372 wrote to memory of 1792 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 4805325.scr PID 2372 wrote to memory of 1696 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 1210827.scr PID 2372 wrote to memory of 1696 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 1210827.scr PID 2372 wrote to memory of 1696 2372 c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe 1210827.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe"C:\Users\Admin\AppData\Local\Temp\c6d02ffc80658a75e14c93ff63b4704941124f1ab357c5ad1dc750205a38d823.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\7639770.scr"C:\Users\Admin\AppData\Roaming\7639770.scr" /S2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\6051877.scr"C:\Users\Admin\AppData\Roaming\6051877.scr" /S2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\2039295.scr"C:\Users\Admin\AppData\Roaming\2039295.scr" /S2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\2432216.scr"C:\Users\Admin\AppData\Roaming\2432216.scr" /S2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\4805325.scr"C:\Users\Admin\AppData\Roaming\4805325.scr" /S2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1210827.scr"C:\Users\Admin\AppData\Roaming\1210827.scr" /S2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\1210827.scrMD5
f8448fbe34a9cfcae04bc6c9ec45755e
SHA1b9d1f27e8cbc4527bd1b44dd589e714c3fc2474b
SHA2568bdef052bb678168846735d11679997f6a0aaf58827fb0c419db0739c6f2e978
SHA512ce1727e7fa79e6c5ed4a851fcbee56cd3c67a9273d795015554ed4bbe45bad318e67e2732564ad53e4a5890cded78cc38ba2700c93185fa5bd8ec38e2ad70d91
-
C:\Users\Admin\AppData\Roaming\1210827.scrMD5
f8448fbe34a9cfcae04bc6c9ec45755e
SHA1b9d1f27e8cbc4527bd1b44dd589e714c3fc2474b
SHA2568bdef052bb678168846735d11679997f6a0aaf58827fb0c419db0739c6f2e978
SHA512ce1727e7fa79e6c5ed4a851fcbee56cd3c67a9273d795015554ed4bbe45bad318e67e2732564ad53e4a5890cded78cc38ba2700c93185fa5bd8ec38e2ad70d91
-
C:\Users\Admin\AppData\Roaming\2039295.scrMD5
41b024c2772af7e0ee44f44d9c1b355b
SHA167d214ab1964fe2690ec66a855e5fdfab7aef927
SHA256ec7b4d2dc1d89e112b3ecd49ff70df5098214e69d38536a2a24aee15e1991027
SHA51279cce9684e259bdd42130e29f0264bdfa3868c76560cce12f3bb410fe768a78d842e2f054e057e546c860a6b71349c1b1647569ef5b3f26b1c66482a20d887d4
-
C:\Users\Admin\AppData\Roaming\2432216.scrMD5
6023eac4d72969f9b0de8f828ea378ef
SHA11cb0d928e5edcc585eda6a268946c3ad00554e2f
SHA256316816c6be1c77c09a93a5a27c780e7db33f6efd0459bbce3f796f63d3eba595
SHA512053ebd616f45cd0878314ca4c110fca2ddd68cd935275d084e2b26026c7f14da0fc9f8903e5be6b9382559a95d4964769c7c70e9f6c78f6d6000598853019e36
-
C:\Users\Admin\AppData\Roaming\4805325.scrMD5
e4ba5731421dfa9fec766e7cb1927ae9
SHA193e17cfbdabb7f5eea14efb99516d5b6c45489d4
SHA256c6a876f43adefb6be72ae43fbd4eb079301cbe7a052461b29bc87c2d5f98eca6
SHA512bc9e16b1a5f75aea432816ea093b672c2b4dc46a29f2a45a7023bd4328c46e828be3efce1dc84bc6bd620a2d0f9eaba42c0f9d7767661f94cba0b23d9dbb23d6
-
C:\Users\Admin\AppData\Roaming\6051877.scrMD5
189f317d17e76c9508138a99ba559789
SHA1e7bb485fec167181daff91307695e9dcbbede996
SHA256ceb9eb8c49009fd993ce1aacdf61464e9f091d4166816a2bd6a9ed19cdd5375a
SHA512784b7c10e00b761d0c316b7ff96ac325f0bc29347b8824e482240d7df2e193517b99bf924c8a9d011e62f7d7a86405436d3ed4dfdf3a0165b82be95bd869af4b
-
C:\Users\Admin\AppData\Roaming\6051877.scrMD5
189f317d17e76c9508138a99ba559789
SHA1e7bb485fec167181daff91307695e9dcbbede996
SHA256ceb9eb8c49009fd993ce1aacdf61464e9f091d4166816a2bd6a9ed19cdd5375a
SHA512784b7c10e00b761d0c316b7ff96ac325f0bc29347b8824e482240d7df2e193517b99bf924c8a9d011e62f7d7a86405436d3ed4dfdf3a0165b82be95bd869af4b
-
C:\Users\Admin\AppData\Roaming\7639770.scrMD5
2bffa3f9327a1bacdf6809219266e1e6
SHA19db7e9b73ab0f155080f212b7b9601e1f1d5361d
SHA2564d0971ac3a17354f88ae34711f983d2b769f42fb886c70b00198617e791b63b0
SHA512534e80e683ffafb0937b09b0493def0cb9d79e3b025da8689e2c7fbb4c983f1d5c7912d00661156ef7ea4607d97f4fa061d41310ae684a71fc043ccc62cf4442
-
C:\Users\Admin\AppData\Roaming\7639770.scrMD5
2bffa3f9327a1bacdf6809219266e1e6
SHA19db7e9b73ab0f155080f212b7b9601e1f1d5361d
SHA2564d0971ac3a17354f88ae34711f983d2b769f42fb886c70b00198617e791b63b0
SHA512534e80e683ffafb0937b09b0493def0cb9d79e3b025da8689e2c7fbb4c983f1d5c7912d00661156ef7ea4607d97f4fa061d41310ae684a71fc043ccc62cf4442
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
189f317d17e76c9508138a99ba559789
SHA1e7bb485fec167181daff91307695e9dcbbede996
SHA256ceb9eb8c49009fd993ce1aacdf61464e9f091d4166816a2bd6a9ed19cdd5375a
SHA512784b7c10e00b761d0c316b7ff96ac325f0bc29347b8824e482240d7df2e193517b99bf924c8a9d011e62f7d7a86405436d3ed4dfdf3a0165b82be95bd869af4b
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
189f317d17e76c9508138a99ba559789
SHA1e7bb485fec167181daff91307695e9dcbbede996
SHA256ceb9eb8c49009fd993ce1aacdf61464e9f091d4166816a2bd6a9ed19cdd5375a
SHA512784b7c10e00b761d0c316b7ff96ac325f0bc29347b8824e482240d7df2e193517b99bf924c8a9d011e62f7d7a86405436d3ed4dfdf3a0165b82be95bd869af4b
-
memory/532-199-0x0000000007140000-0x0000000007141000-memory.dmpFilesize
4KB
-
memory/532-159-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/532-161-0x0000000005850000-0x0000000005851000-memory.dmpFilesize
4KB
-
memory/532-160-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/532-158-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/532-157-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/532-135-0x0000000000000000-mapping.dmp
-
memory/532-154-0x0000000005E70000-0x0000000005E71000-memory.dmpFilesize
4KB
-
memory/532-153-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/532-151-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/532-205-0x0000000007360000-0x0000000007361000-memory.dmpFilesize
4KB
-
memory/1268-148-0x0000000008740000-0x0000000008741000-memory.dmpFilesize
4KB
-
memory/1268-137-0x0000000000000000-mapping.dmp
-
memory/1268-150-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/1268-145-0x0000000007C50000-0x0000000007C51000-memory.dmpFilesize
4KB
-
memory/1696-186-0x00000000057E0000-0x00000000057E1000-memory.dmpFilesize
4KB
-
memory/1696-174-0x0000000000000000-mapping.dmp
-
memory/1696-177-0x0000000000EA0000-0x0000000000EA1000-memory.dmpFilesize
4KB
-
memory/1792-182-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/1792-188-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/1792-171-0x0000000000000000-mapping.dmp
-
memory/1792-195-0x0000000006260000-0x0000000006261000-memory.dmpFilesize
4KB
-
memory/2372-115-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2372-118-0x000000001B0C0000-0x000000001B0C2000-memory.dmpFilesize
8KB
-
memory/2372-117-0x00000000007E0000-0x00000000007E1000-memory.dmpFilesize
4KB
-
memory/2904-132-0x0000000005B80000-0x0000000005B81000-memory.dmpFilesize
4KB
-
memory/2904-131-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/2904-119-0x0000000000000000-mapping.dmp
-
memory/2904-133-0x0000000006280000-0x0000000006281000-memory.dmpFilesize
4KB
-
memory/2904-134-0x0000000005DF0000-0x0000000005DF1000-memory.dmpFilesize
4KB
-
memory/2904-126-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/2904-147-0x0000000005E90000-0x0000000005E91000-memory.dmpFilesize
4KB
-
memory/3644-163-0x0000000077000000-0x000000007718E000-memory.dmpFilesize
1.6MB
-
memory/3644-172-0x0000000005C60000-0x0000000005C61000-memory.dmpFilesize
4KB
-
memory/3644-164-0x0000000000D40000-0x0000000000D41000-memory.dmpFilesize
4KB
-
memory/3644-155-0x0000000000000000-mapping.dmp
-
memory/3772-130-0x0000000007860000-0x0000000007861000-memory.dmpFilesize
4KB
-
memory/3772-129-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/3772-125-0x00000000006F0000-0x00000000006F1000-memory.dmpFilesize
4KB
-
memory/3772-121-0x0000000000000000-mapping.dmp