Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 12:02
Static task
static1
Behavioral task
behavioral1
Sample
d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe
Resource
win7-en-20211208
General
-
Target
d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe
-
Size
120KB
-
MD5
031d9264f4c5fb68ab00e9b820a5a869
-
SHA1
268c830c713756bd60a33f765f49e6207ab3d2e5
-
SHA256
d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158
-
SHA512
0bce0870090603f68c7f5e5902accaaf1b79afc5d13d983ac28881a3f4ce268fb3ea50594609333de96801b0400f8bea4cae25d8c9b2f364b55d8b06d2bc4c72
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/exp.php?usr=Rachel
DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7
rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi
Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb
TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1
t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT
GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC
497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6
qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp
bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l
0x9bd5f03363CA0231A32b3B36ae2cf01623E2D1fE
LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91
ronin:09864801afc2b70c960366f4c8ad806fe9d6965d
Signatures
-
suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1
suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1
-
Executes dropped EXE 2 IoCs
pid Process 1552 subst.exe 1692 subst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe 1692 subst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1248 1624 d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe 27 PID 1624 wrote to memory of 1248 1624 d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe 27 PID 1624 wrote to memory of 1248 1624 d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe 27 PID 1624 wrote to memory of 1248 1624 d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe 27 PID 1296 wrote to memory of 1552 1296 taskeng.exe 30 PID 1296 wrote to memory of 1552 1296 taskeng.exe 30 PID 1296 wrote to memory of 1552 1296 taskeng.exe 30 PID 1296 wrote to memory of 1552 1296 taskeng.exe 30 PID 1296 wrote to memory of 1692 1296 taskeng.exe 35 PID 1296 wrote to memory of 1692 1296 taskeng.exe 35 PID 1296 wrote to memory of 1692 1296 taskeng.exe 35 PID 1296 wrote to memory of 1692 1296 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe"C:\Users\Admin\AppData\Local\Temp\d496f178f6400d703c1bc434b7694369d94c68a5756f811bb5ded09ff78b1158.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Creates scheduled task(s)
PID:1248
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FB61CB7-07E1-4BA3-91A0-54704A828E32} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1692
-