Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 15:05
Static task
static1
Behavioral task
behavioral1
Sample
Open__File_-Setup.exe
Resource
win7-en-20211208
General
-
Target
Open__File_-Setup.exe
-
Size
2.6MB
-
MD5
f0b845c4482445e3687374a9bc0721d9
-
SHA1
30aca922fb58f40860d43f7e092cb5f0421dfd43
-
SHA256
50425bbffda899deae06a34073cbfcec097ded72f040d19ba91318dd39975b4b
-
SHA512
b4df83357138608be2e995c393485047d8c0c813492495ab10d2af877b5160c0d29401ab2d053fd605124b4a0779204e08a8d306588b68f4cc14cae58f57a1c2
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
File1.exeIntelRapid.exepid process 656 File1.exe 3608 IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
File1.exeIntelRapid.exeOpen__File_-Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Open__File_-Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Open__File_-Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File1.exe -
Drops startup file 1 IoCs
Processes:
File1.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk File1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2608-118-0x0000000000090000-0x000000000074B000-memory.dmp themida behavioral2/memory/2608-120-0x0000000000090000-0x000000000074B000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\File1.exe themida C:\Users\Admin\AppData\Local\Temp\File1.exe themida behavioral2/memory/656-123-0x00007FF657220000-0x00007FF657B42000-memory.dmp themida behavioral2/memory/656-124-0x00007FF657220000-0x00007FF657B42000-memory.dmp themida behavioral2/memory/656-125-0x00007FF657220000-0x00007FF657B42000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral2/memory/3608-128-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmp themida behavioral2/memory/3608-129-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmp themida behavioral2/memory/3608-130-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Open__File_-Setup.exeFile1.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Open__File_-Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Open__File_-Setup.exeFile1.exeIntelRapid.exepid process 2608 Open__File_-Setup.exe 656 File1.exe 3608 IntelRapid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Open__File_-Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Open__File_-Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Open__File_-Setup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 704 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 3608 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Open__File_-Setup.exepid process 2608 Open__File_-Setup.exe 2608 Open__File_-Setup.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Open__File_-Setup.execmd.exeFile1.exedescription pid process target process PID 2608 wrote to memory of 656 2608 Open__File_-Setup.exe File1.exe PID 2608 wrote to memory of 656 2608 Open__File_-Setup.exe File1.exe PID 2608 wrote to memory of 524 2608 Open__File_-Setup.exe cmd.exe PID 2608 wrote to memory of 524 2608 Open__File_-Setup.exe cmd.exe PID 2608 wrote to memory of 524 2608 Open__File_-Setup.exe cmd.exe PID 524 wrote to memory of 704 524 cmd.exe timeout.exe PID 524 wrote to memory of 704 524 cmd.exe timeout.exe PID 524 wrote to memory of 704 524 cmd.exe timeout.exe PID 656 wrote to memory of 3608 656 File1.exe IntelRapid.exe PID 656 wrote to memory of 3608 656 File1.exe IntelRapid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Open__File_-Setup.exe"C:\Users\Admin\AppData\Local\Temp\Open__File_-Setup.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\File1.exe"C:\Users\Admin\AppData\Local\Temp\File1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Open__File_-Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\File1.exeMD5
ea345ce2b32c6a7e42b2cf2319b28f06
SHA1488b6ecbca06456f550eac7d38948329ad932a8f
SHA256f90452c51e3a385e62283584a8c7af51249e8a0a7af0901a5786c358cf0e9511
SHA5129069d2bf2bd72d8eb426e54c90952c2475ac75ace3c871829a17b7a147dec27ec1eb1ad91abc4796542ca83c1ded1b7935469f721615909fca73529ab1d1abf2
-
C:\Users\Admin\AppData\Local\Temp\File1.exeMD5
ea345ce2b32c6a7e42b2cf2319b28f06
SHA1488b6ecbca06456f550eac7d38948329ad932a8f
SHA256f90452c51e3a385e62283584a8c7af51249e8a0a7af0901a5786c358cf0e9511
SHA5129069d2bf2bd72d8eb426e54c90952c2475ac75ace3c871829a17b7a147dec27ec1eb1ad91abc4796542ca83c1ded1b7935469f721615909fca73529ab1d1abf2
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
ea345ce2b32c6a7e42b2cf2319b28f06
SHA1488b6ecbca06456f550eac7d38948329ad932a8f
SHA256f90452c51e3a385e62283584a8c7af51249e8a0a7af0901a5786c358cf0e9511
SHA5129069d2bf2bd72d8eb426e54c90952c2475ac75ace3c871829a17b7a147dec27ec1eb1ad91abc4796542ca83c1ded1b7935469f721615909fca73529ab1d1abf2
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
ea345ce2b32c6a7e42b2cf2319b28f06
SHA1488b6ecbca06456f550eac7d38948329ad932a8f
SHA256f90452c51e3a385e62283584a8c7af51249e8a0a7af0901a5786c358cf0e9511
SHA5129069d2bf2bd72d8eb426e54c90952c2475ac75ace3c871829a17b7a147dec27ec1eb1ad91abc4796542ca83c1ded1b7935469f721615909fca73529ab1d1abf2
-
memory/656-123-0x00007FF657220000-0x00007FF657B42000-memory.dmpFilesize
9.1MB
-
memory/656-124-0x00007FF657220000-0x00007FF657B42000-memory.dmpFilesize
9.1MB
-
memory/656-125-0x00007FF657220000-0x00007FF657B42000-memory.dmpFilesize
9.1MB
-
memory/2608-120-0x0000000000090000-0x000000000074B000-memory.dmpFilesize
6.7MB
-
memory/2608-119-0x00000000775A0000-0x000000007772E000-memory.dmpFilesize
1.6MB
-
memory/2608-118-0x0000000000090000-0x000000000074B000-memory.dmpFilesize
6.7MB
-
memory/3608-128-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmpFilesize
9.1MB
-
memory/3608-129-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmpFilesize
9.1MB
-
memory/3608-130-0x00007FF6E2990000-0x00007FF6E32B2000-memory.dmpFilesize
9.1MB