Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 12:02

General

  • Target

    d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe

  • Size

    120KB

  • MD5

    031d9264f4c5fb68ab00e9b820a5a869

  • SHA1

    268c830c713756bd60a33f765f49e6207ab3d2e5

  • SHA256

    d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158

  • SHA512

    0bce0870090603f68c7f5e5902accaaf1b79afc5d13d983ac28881a3f4ce268fb3ea50594609333de96801b0400f8bea4cae25d8c9b2f364b55d8b06d2bc4c72

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/exp.php?usr=Rachel

Wallets

DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7

rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi

Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb

TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1

t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT

GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC

497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6

qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp

bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l

0x9bd5f03363CA0231A32b3B36ae2cf01623E2D1fE

LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91

ronin:09864801afc2b70c960366f4c8ad806fe9d6965d

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1

    suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe
    "C:\Users\Admin\AppData\Local\Temp\d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Creates scheduled task(s)
      PID:1248
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6FB61CB7-07E1-4BA3-91A0-54704A828E32} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Executes dropped EXE
      PID:1552
    • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1624-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB