Analysis
-
max time kernel
157s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 12:02
Static task
static1
Behavioral task
behavioral1
Sample
f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe
Resource
win7-en-20211208
General
-
Target
f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe
-
Size
120KB
-
MD5
40b3c1644d3bd1702fdde6eb08f961d2
-
SHA1
b6ae788abe3a524910bf2353dd55ab0fe831a7b2
-
SHA256
f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f
-
SHA512
85b2fedab47670714df9773ce9a6c2bf6701483a208aef087ed483f8b202b8ff04d4fcbada0fca63f668e60082fd226c4038138f46cdc3efee0093ccb286783d
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/exp.php?usr=budprosche
DAiQQwrXqMvJh7dmrAf1juGVUPYoVhGMmb
rJCGM2bkktXaV3GvJhJnSnUnRGjSVRe3Qi
XoHHtksivtoG6B7ACT553QZfA8L294kLtL
TA5Tw8JpE2KyLgKogiC8ztyZ5AzSr22uW8
t1d2iYaHeeEHLs1UbVV7KsyZYvcP7HxcMYx
GAL35I3GVOD3IC34MBQ25L3QVMV54TYYSUGUSLGVWZXQONE5B5HLLR42
46Z2LbxsLB7Gijdo5TTpMdYssc9zLBC1k7MRjqZ7WT6tEycgiXF34SoTtyzdc29Ew8KSKUQMhuDmZf5Suv2Ft8Ke9aQr6db
qquysdz00zartzyrzufkzq2l3jv9gayyz5srqvfzcq
bc1qmvhlgeav49kw20lfejscgsd94rp3pkqt5c3fu4
0xcA4aeC6159a691d2FC5e8970F4c822554EcD4567
LX8V72paGcQgYNDhv4cJgEqCUF8WgEQf7Y
ronin:3d6be72d8f836295c22889b5da5b485d4fa6a44e
Signatures
-
suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1
suricata: ET MALWARE Win32/ClipBanker.OC CnC Activity M1
-
Executes dropped EXE 1 IoCs
Processes:
subst.exepid process 4496 subst.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
subst.exepid process 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe 4496 subst.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 1404 svchost.exe Token: SeCreatePagefilePrivilege 1404 svchost.exe Token: SeShutdownPrivilege 1404 svchost.exe Token: SeCreatePagefilePrivilege 1404 svchost.exe Token: SeShutdownPrivilege 1404 svchost.exe Token: SeCreatePagefilePrivilege 1404 svchost.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe Token: SeRestorePrivilege 2172 TiWorker.exe Token: SeSecurityPrivilege 2172 TiWorker.exe Token: SeBackupPrivilege 2172 TiWorker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exedescription pid process target process PID 4124 wrote to memory of 3612 4124 f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe schtasks.exe PID 4124 wrote to memory of 3612 4124 f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe schtasks.exe PID 4124 wrote to memory of 3612 4124 f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe"C:\Users\Admin\AppData\Local\Temp\f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Creates scheduled task(s)
PID:3612
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
40b3c1644d3bd1702fdde6eb08f961d2
SHA1b6ae788abe3a524910bf2353dd55ab0fe831a7b2
SHA256f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f
SHA51285b2fedab47670714df9773ce9a6c2bf6701483a208aef087ed483f8b202b8ff04d4fcbada0fca63f668e60082fd226c4038138f46cdc3efee0093ccb286783d
-
MD5
40b3c1644d3bd1702fdde6eb08f961d2
SHA1b6ae788abe3a524910bf2353dd55ab0fe831a7b2
SHA256f04444ba33a73f6fa9770d0330cc489bf8b919f6c3342b66e3f423894ea22f2f
SHA51285b2fedab47670714df9773ce9a6c2bf6701483a208aef087ed483f8b202b8ff04d4fcbada0fca63f668e60082fd226c4038138f46cdc3efee0093ccb286783d