6711694555512832.zip
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
403KB
10-11-2021 14:53
f957e397e71010885b67f2afe37d8161
a8bf84b971b37ac6e7f66c5e5a7e971a7741401e
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66
Filter: none
-
Modifies Windows Defender Real-time Protection settings
Tags
TTPs
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Description
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Tags
-
Downloads MZ/PE file
-
Executes dropped EXEqOvdqyVcqbCorVKkcfUuMRqK.exe
Reported IOCs
pid process 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe -
Checks computer location settings022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Description
Looks up country code configured in the registry, likely geofence.
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Control Panel\International\Geo\Nation 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe -
Loads dropped DLL022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Reported IOCs
pid process 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Looks up external IP address via web service
Description
Uses a legitimate IP lookup service to find the infected system's external IP.
Reported IOCs
flow ioc 14 ipinfo.io 18 api.db-ip.com 19 api.db-ip.com -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Program crashWerFault.exe
Reported IOCs
pid pid_target process target process 1104 2004 WerFault.exe 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe -
Suspicious behavior: EnumeratesProcesses022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exeqOvdqyVcqbCorVKkcfUuMRqK.exeWerFault.exe
Reported IOCs
pid process 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe 1980 qOvdqyVcqbCorVKkcfUuMRqK.exe -
Suspicious use of AdjustPrivilegeTokenWerFault.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 1104 WerFault.exe -
Suspicious use of WriteProcessMemory022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Reported IOCs
description pid process target process PID 2004 wrote to memory of 1980 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qOvdqyVcqbCorVKkcfUuMRqK.exe PID 2004 wrote to memory of 1980 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qOvdqyVcqbCorVKkcfUuMRqK.exe PID 2004 wrote to memory of 1980 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qOvdqyVcqbCorVKkcfUuMRqK.exe PID 2004 wrote to memory of 1980 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qOvdqyVcqbCorVKkcfUuMRqK.exe PID 2004 wrote to memory of 1104 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WerFault.exe PID 2004 wrote to memory of 1104 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WerFault.exe PID 2004 wrote to memory of 1104 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WerFault.exe PID 2004 wrote to memory of 1104 2004 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WerFault.exe
-
C:\Users\Admin\AppData\Local\Temp\022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe"C:\Users\Admin\AppData\Local\Temp\022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe"Checks computer location settingsLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\qOvdqyVcqbCorVKkcfUuMRqK.exe"C:\Users\Admin\Pictures\Adobe Films\qOvdqyVcqbCorVKkcfUuMRqK.exe"Executes dropped EXESuspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 1412Program crashSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\qOvdqyVcqbCorVKkcfUuMRqK.exe
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
\Users\Admin\Pictures\Adobe Films\qOvdqyVcqbCorVKkcfUuMRqK.exe
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
memory/1104-61-0x00000000005C0000-0x00000000005C1000-memory.dmp
-
memory/1104-60-0x0000000000000000-mapping.dmp
-
memory/1980-58-0x0000000000000000-mapping.dmp
-
memory/2004-56-0x0000000003E80000-0x0000000003FCC000-memory.dmp
-
memory/2004-55-0x0000000076231000-0x0000000076233000-memory.dmp