Analysis
-
max time kernel
78s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 08:13
Static task
static1
General
-
Target
0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe
-
Size
74KB
-
MD5
40eeb8d964bc5f76d2eb5868e12f51b6
-
SHA1
efe79b2057496d2106a4388e8f4b8a0150548da9
-
SHA256
0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749
-
SHA512
eb207df11812857949e56e00624f5655b40b60470a48b54c76100bc92d158e6e1687cb260ccef3e1c7c7d97fd18061d741c698c82683aff7a964f37982275d30
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 6 IoCs
Processes:
6094735.exe928310.exe7006806.exe6977121.exe1683304.exeWinHoster.exepid process 3012 6094735.exe 4428 928310.exe 4520 7006806.exe 4504 6977121.exe 3764 1683304.exe 1172 WinHoster.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
928310.exe7006806.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 928310.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7006806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7006806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 928310.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\928310.exe themida C:\Users\Admin\AppData\Roaming\928310.exe themida C:\Users\Admin\AppData\Roaming\7006806.exe themida C:\Users\Admin\AppData\Roaming\7006806.exe themida behavioral1/memory/4520-159-0x00000000012C0000-0x00000000012C1000-memory.dmp themida behavioral1/memory/4428-186-0x00000000009D0000-0x00000000009D1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6977121.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6977121.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
7006806.exe928310.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7006806.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 928310.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
7006806.exe928310.exepid process 4520 7006806.exe 4428 928310.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
6094735.exe7006806.exe1683304.exe928310.exepid process 3012 6094735.exe 4520 7006806.exe 4520 7006806.exe 3764 1683304.exe 3012 6094735.exe 3764 1683304.exe 4428 928310.exe 4428 928310.exe 4520 7006806.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe6094735.exe1683304.exe7006806.exe928310.exedescription pid process Token: SeDebugPrivilege 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe Token: SeDebugPrivilege 3012 6094735.exe Token: SeDebugPrivilege 3764 1683304.exe Token: SeDebugPrivilege 4520 7006806.exe Token: SeDebugPrivilege 4428 928310.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe6977121.exedescription pid process target process PID 3716 wrote to memory of 3012 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6094735.exe PID 3716 wrote to memory of 3012 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6094735.exe PID 3716 wrote to memory of 3012 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6094735.exe PID 3716 wrote to memory of 4428 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 928310.exe PID 3716 wrote to memory of 4428 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 928310.exe PID 3716 wrote to memory of 4428 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 928310.exe PID 3716 wrote to memory of 4520 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 7006806.exe PID 3716 wrote to memory of 4520 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 7006806.exe PID 3716 wrote to memory of 4520 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 7006806.exe PID 3716 wrote to memory of 4504 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6977121.exe PID 3716 wrote to memory of 4504 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6977121.exe PID 3716 wrote to memory of 4504 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 6977121.exe PID 3716 wrote to memory of 3764 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 1683304.exe PID 3716 wrote to memory of 3764 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 1683304.exe PID 3716 wrote to memory of 3764 3716 0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe 1683304.exe PID 4504 wrote to memory of 1172 4504 6977121.exe WinHoster.exe PID 4504 wrote to memory of 1172 4504 6977121.exe WinHoster.exe PID 4504 wrote to memory of 1172 4504 6977121.exe WinHoster.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe"C:\Users\Admin\AppData\Local\Temp\0a70e20df0e0f4af3e365c7f00587f5b31f0048a9fd3091c4fcfc90000920749.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\6094735.exe"C:\Users\Admin\AppData\Roaming\6094735.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\928310.exe"C:\Users\Admin\AppData\Roaming\928310.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\7006806.exe"C:\Users\Admin\AppData\Roaming\7006806.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\6977121.exe"C:\Users\Admin\AppData\Roaming\6977121.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1683304.exe"C:\Users\Admin\AppData\Roaming\1683304.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\1683304.exeMD5
eca5a9ac4b5c0bd9735e66d1773b52fd
SHA1af27bb06fe437c54d6e74f4642ae270af7581f85
SHA2562d577b77b05b95f7264eb4d9c423fcea1ad781fde027f40a26931fce42d3842c
SHA51224eeda96573421755d85d2e0adaa8b97ebef03eb1942b20051258d72b04d0cd2a14274a1ca0106d1ea6d3157e559008d86605885784e2bcba36ab4ad6749167c
-
C:\Users\Admin\AppData\Roaming\1683304.exeMD5
eca5a9ac4b5c0bd9735e66d1773b52fd
SHA1af27bb06fe437c54d6e74f4642ae270af7581f85
SHA2562d577b77b05b95f7264eb4d9c423fcea1ad781fde027f40a26931fce42d3842c
SHA51224eeda96573421755d85d2e0adaa8b97ebef03eb1942b20051258d72b04d0cd2a14274a1ca0106d1ea6d3157e559008d86605885784e2bcba36ab4ad6749167c
-
C:\Users\Admin\AppData\Roaming\6094735.exeMD5
4f7d10b92d12da0ff18665d97b47e41c
SHA11d33798862043bce4f32945defc409be9d8b4c1f
SHA256a4fcdedd5c2776be6ef383379ceb3c035a0521c8550b208cd0d46b833afe738e
SHA512eefdff04e48db768b0f7c3ae45c7f6c7c93689ea707d3fe4bb8ed20421d406aba9877920f532f9fe2c33aea78628ad14199d95431628c5f54f9606d48f09b612
-
C:\Users\Admin\AppData\Roaming\6094735.exeMD5
4f7d10b92d12da0ff18665d97b47e41c
SHA11d33798862043bce4f32945defc409be9d8b4c1f
SHA256a4fcdedd5c2776be6ef383379ceb3c035a0521c8550b208cd0d46b833afe738e
SHA512eefdff04e48db768b0f7c3ae45c7f6c7c93689ea707d3fe4bb8ed20421d406aba9877920f532f9fe2c33aea78628ad14199d95431628c5f54f9606d48f09b612
-
C:\Users\Admin\AppData\Roaming\6977121.exeMD5
a20e32791806c7b29070b95226b0e480
SHA18f2bac75ffabbe45770076047ded99f243622e5f
SHA256df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146
SHA5126cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0
-
C:\Users\Admin\AppData\Roaming\6977121.exeMD5
a20e32791806c7b29070b95226b0e480
SHA18f2bac75ffabbe45770076047ded99f243622e5f
SHA256df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146
SHA5126cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0
-
C:\Users\Admin\AppData\Roaming\7006806.exeMD5
a983f21830995c68472ebfa937acf4ca
SHA137b652cdf432a14d658ace5447c51d6954fc8fdb
SHA2568ad9e5bb76241b55016fcc32dfed84d2fe80d64463f781d408e2eb51c8beb3c0
SHA512cd2c0c4b833d85a0e7cd1627d9a3fc9332b2c65821ea5f1982fde85568d4f008b263826210c6912222b98e6207268cde467f1010f775b77fa9633b51280494e3
-
C:\Users\Admin\AppData\Roaming\7006806.exeMD5
a983f21830995c68472ebfa937acf4ca
SHA137b652cdf432a14d658ace5447c51d6954fc8fdb
SHA2568ad9e5bb76241b55016fcc32dfed84d2fe80d64463f781d408e2eb51c8beb3c0
SHA512cd2c0c4b833d85a0e7cd1627d9a3fc9332b2c65821ea5f1982fde85568d4f008b263826210c6912222b98e6207268cde467f1010f775b77fa9633b51280494e3
-
C:\Users\Admin\AppData\Roaming\928310.exeMD5
afb53e37a817304cb9ebd143418159c1
SHA1eb5db5e0a6755c0aed544d2a037ac22928bcdc8b
SHA25617849797ee055a10567c6ca129583db58386385a978f74cd19c9c662f1dc1726
SHA512475466219bc1b7d9451478969385997656a5cc367a9bc1e6d5b26f0e6559b529ba7452e6825a9de4587278af9c52c80bb1dbdca35ebf35d68a2ed7a98b2e261a
-
C:\Users\Admin\AppData\Roaming\928310.exeMD5
afb53e37a817304cb9ebd143418159c1
SHA1eb5db5e0a6755c0aed544d2a037ac22928bcdc8b
SHA25617849797ee055a10567c6ca129583db58386385a978f74cd19c9c662f1dc1726
SHA512475466219bc1b7d9451478969385997656a5cc367a9bc1e6d5b26f0e6559b529ba7452e6825a9de4587278af9c52c80bb1dbdca35ebf35d68a2ed7a98b2e261a
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
a20e32791806c7b29070b95226b0e480
SHA18f2bac75ffabbe45770076047ded99f243622e5f
SHA256df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146
SHA5126cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
a20e32791806c7b29070b95226b0e480
SHA18f2bac75ffabbe45770076047ded99f243622e5f
SHA256df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146
SHA5126cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0
-
memory/1172-180-0x0000000005940000-0x0000000005941000-memory.dmpFilesize
4KB
-
memory/1172-156-0x0000000000000000-mapping.dmp
-
memory/1172-175-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/3012-122-0x0000000000FD0000-0x0000000000FD1000-memory.dmpFilesize
4KB
-
memory/3012-132-0x0000000008740000-0x0000000008741000-memory.dmpFilesize
4KB
-
memory/3012-148-0x00000000083B0000-0x00000000083B1000-memory.dmpFilesize
4KB
-
memory/3012-153-0x0000000008450000-0x0000000008451000-memory.dmpFilesize
4KB
-
memory/3012-131-0x0000000008040000-0x0000000008041000-memory.dmpFilesize
4KB
-
memory/3012-130-0x0000000005B10000-0x0000000005B11000-memory.dmpFilesize
4KB
-
memory/3012-126-0x00000000031C0000-0x00000000031C1000-memory.dmpFilesize
4KB
-
memory/3012-125-0x0000000005310000-0x0000000005359000-memory.dmpFilesize
292KB
-
memory/3012-139-0x0000000008210000-0x0000000008211000-memory.dmpFilesize
4KB
-
memory/3012-124-0x0000000003150000-0x0000000003151000-memory.dmpFilesize
4KB
-
memory/3012-119-0x0000000000000000-mapping.dmp
-
memory/3716-115-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/3716-118-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/3716-117-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB
-
memory/3764-164-0x0000000002700000-0x0000000002748000-memory.dmpFilesize
288KB
-
memory/3764-142-0x0000000000000000-mapping.dmp
-
memory/3764-150-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/3764-172-0x0000000000F40000-0x0000000000F41000-memory.dmpFilesize
4KB
-
memory/3764-157-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/3764-168-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/4428-186-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/4428-193-0x00000000776F0000-0x000000007787E000-memory.dmpFilesize
1.6MB
-
memory/4428-194-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/4428-127-0x0000000000000000-mapping.dmp
-
memory/4504-145-0x000000000AC10000-0x000000000AC11000-memory.dmpFilesize
4KB
-
memory/4504-149-0x00000000010B0000-0x00000000010B1000-memory.dmpFilesize
4KB
-
memory/4504-135-0x0000000000000000-mapping.dmp
-
memory/4504-140-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/4504-144-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/4520-178-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/4520-171-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/4520-151-0x00000000776F0000-0x000000007787E000-memory.dmpFilesize
1.6MB
-
memory/4520-177-0x0000000005870000-0x0000000005871000-memory.dmpFilesize
4KB
-
memory/4520-165-0x0000000005E90000-0x0000000005E91000-memory.dmpFilesize
4KB
-
memory/4520-169-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB
-
memory/4520-167-0x00000000033B0000-0x00000000033B1000-memory.dmpFilesize
4KB
-
memory/4520-159-0x00000000012C0000-0x00000000012C1000-memory.dmpFilesize
4KB
-
memory/4520-133-0x0000000000000000-mapping.dmp
-
memory/4520-197-0x0000000006E30000-0x0000000006E31000-memory.dmpFilesize
4KB
-
memory/4520-200-0x00000000071F0000-0x00000000071F1000-memory.dmpFilesize
4KB
-
memory/4520-209-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB