Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-12-2021 18:32
Static task
static1
Behavioral task
behavioral1
Sample
2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe
Resource
win10-en-20211208
General
-
Target
2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe
-
Size
1.7MB
-
MD5
bb9e3c71b3ee3279632905f905ac21c4
-
SHA1
a2b1d81ec6a21b52f555f5ec7e9cf9a73f937971
-
SHA256
2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea
-
SHA512
f63faf0d317fa32fa9e091dfb0327752433c94c2d8171ef1d4b988288012de2062c89c37c87513873010e7ea78e71d54981ca17cec333222eb9ad9bbb9600916
Malware Config
Extracted
jester
ads555man
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/ads555man
https://api.anonfiles.com/upload?token=d26d620842507144
efbb42d7-d0db-4f16-a194-3d9d9d1fc654
-
license_key
65EEBAF23D4744267D131CD5BA37E706
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 Tor.exe -
Loads dropped DLL 9 IoCs
pid Process 1704 CasPol.exe 1704 CasPol.exe 1724 Tor.exe 1724 Tor.exe 1724 Tor.exe 1724 Tor.exe 1724 Tor.exe 1724 Tor.exe 1724 Tor.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CasPol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier CasPol.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 320 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 1704 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe Token: SeDebugPrivilege 1704 CasPol.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1584 wrote to memory of 1704 1584 2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe 27 PID 1704 wrote to memory of 1988 1704 CasPol.exe 29 PID 1704 wrote to memory of 1988 1704 CasPol.exe 29 PID 1704 wrote to memory of 1988 1704 CasPol.exe 29 PID 1704 wrote to memory of 1988 1704 CasPol.exe 29 PID 1988 wrote to memory of 364 1988 cmd.exe 31 PID 1988 wrote to memory of 364 1988 cmd.exe 31 PID 1988 wrote to memory of 364 1988 cmd.exe 31 PID 1988 wrote to memory of 364 1988 cmd.exe 31 PID 1988 wrote to memory of 1540 1988 cmd.exe 32 PID 1988 wrote to memory of 1540 1988 cmd.exe 32 PID 1988 wrote to memory of 1540 1988 cmd.exe 32 PID 1988 wrote to memory of 1540 1988 cmd.exe 32 PID 1988 wrote to memory of 1252 1988 cmd.exe 33 PID 1988 wrote to memory of 1252 1988 cmd.exe 33 PID 1988 wrote to memory of 1252 1988 cmd.exe 33 PID 1988 wrote to memory of 1252 1988 cmd.exe 33 PID 1704 wrote to memory of 1724 1704 CasPol.exe 34 PID 1704 wrote to memory of 1724 1704 CasPol.exe 34 PID 1704 wrote to memory of 1724 1704 CasPol.exe 34 PID 1704 wrote to memory of 1724 1704 CasPol.exe 34 PID 1704 wrote to memory of 1160 1704 CasPol.exe 36 PID 1704 wrote to memory of 1160 1704 CasPol.exe 36 PID 1704 wrote to memory of 1160 1704 CasPol.exe 36 PID 1704 wrote to memory of 1160 1704 CasPol.exe 36 PID 1160 wrote to memory of 836 1160 cmd.exe 38 PID 1160 wrote to memory of 836 1160 cmd.exe 38 PID 1160 wrote to memory of 836 1160 cmd.exe 38 PID 1160 wrote to memory of 836 1160 cmd.exe 38 PID 1160 wrote to memory of 320 1160 cmd.exe 39 PID 1160 wrote to memory of 320 1160 cmd.exe 39 PID 1160 wrote to memory of 320 1160 cmd.exe 39 PID 1160 wrote to memory of 320 1160 cmd.exe 39 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe"C:\Users\Admin\AppData\Local\Temp\2f60704e2dac47d532955485a04c195dffa41f9e638527ac42c82a224b2202ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:364
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:1540
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Tor\Tor.exe"C:\Users\Admin\AppData\Local\Temp\Tor\Tor.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:836
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:320
-
-
-