Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
23/02/2022, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe
Resource
win10v2004-en-20220112
General
-
Target
0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe
-
Size
12.6MB
-
MD5
e63dc29b24934b64f077291d2eba75f2
-
SHA1
b1cdd6ccc14f5f65bef59975667d6306a1cd07b3
-
SHA256
0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488
-
SHA512
b09df1937edc922a2d25bb3f60ac45f289db0a99fb0d0c581da10ff56237c3bd2012f02a28f1afae148dad2f744af86668b2a5e39f09aa286020d8c0221c9213
Malware Config
Signatures
-
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/files/0x000400000001ed31-160.dat WebBrowserPassView behavioral2/files/0x000400000001ed31-161.dat WebBrowserPassView -
Nirsoft 8 IoCs
resource yara_rule behavioral2/files/0x000500000001ed18-155.dat Nirsoft behavioral2/files/0x000500000001ed18-156.dat Nirsoft behavioral2/files/0x000400000001ed31-160.dat Nirsoft behavioral2/files/0x000400000001ed31-161.dat Nirsoft behavioral2/files/0x000400000001ed2a-168.dat Nirsoft behavioral2/files/0x000400000001ed2a-171.dat Nirsoft behavioral2/files/0x000400000001ed2f-175.dat Nirsoft behavioral2/files/0x000400000001ed2f-176.dat Nirsoft -
Executes dropped EXE 9 IoCs
pid Process 3576 asdas.exe 3936 RtkBtManServ.exe 2996 sms.exe 2984 bfsvc.exe 3068 snuvcdsm.exe 3184 winhlp32.exe 644 splwow64.exe 3168 hh.exe 432 xwizard.exe -
resource yara_rule behavioral2/files/0x000500000001ed1a-165.dat upx behavioral2/files/0x000500000001ed1a-166.dat upx behavioral2/files/0x000500000001ed2e-167.dat upx behavioral2/files/0x000500000001ed2e-169.dat upx -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation asdas.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings RtkBtManServ.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3068 snuvcdsm.exe 3068 snuvcdsm.exe 3068 snuvcdsm.exe 3068 snuvcdsm.exe 3168 hh.exe 3168 hh.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe 432 xwizard.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3936 RtkBtManServ.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3576 3012 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe 62 PID 3012 wrote to memory of 3576 3012 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe 62 PID 3012 wrote to memory of 3576 3012 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe 62 PID 3576 wrote to memory of 3936 3576 asdas.exe 72 PID 3576 wrote to memory of 3936 3576 asdas.exe 72 PID 3012 wrote to memory of 2996 3012 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe 73 PID 3012 wrote to memory of 2996 3012 0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe 73 PID 3936 wrote to memory of 2444 3936 RtkBtManServ.exe 77 PID 3936 wrote to memory of 2444 3936 RtkBtManServ.exe 77 PID 2444 wrote to memory of 3324 2444 WScript.exe 78 PID 2444 wrote to memory of 3324 2444 WScript.exe 78 PID 3324 wrote to memory of 2984 3324 cmd.exe 80 PID 3324 wrote to memory of 2984 3324 cmd.exe 80 PID 3324 wrote to memory of 2984 3324 cmd.exe 80 PID 3936 wrote to memory of 3524 3936 RtkBtManServ.exe 81 PID 3936 wrote to memory of 3524 3936 RtkBtManServ.exe 81 PID 3524 wrote to memory of 1292 3524 WScript.exe 82 PID 3524 wrote to memory of 1292 3524 WScript.exe 82 PID 1292 wrote to memory of 3068 1292 cmd.exe 84 PID 1292 wrote to memory of 3068 1292 cmd.exe 84 PID 1292 wrote to memory of 3068 1292 cmd.exe 84 PID 3936 wrote to memory of 3884 3936 RtkBtManServ.exe 86 PID 3936 wrote to memory of 3884 3936 RtkBtManServ.exe 86 PID 3884 wrote to memory of 3892 3884 WScript.exe 87 PID 3884 wrote to memory of 3892 3884 WScript.exe 87 PID 3892 wrote to memory of 3184 3892 cmd.exe 89 PID 3892 wrote to memory of 3184 3892 cmd.exe 89 PID 3892 wrote to memory of 3184 3892 cmd.exe 89 PID 3892 wrote to memory of 644 3892 cmd.exe 91 PID 3892 wrote to memory of 644 3892 cmd.exe 91 PID 3892 wrote to memory of 644 3892 cmd.exe 91 PID 3892 wrote to memory of 3168 3892 cmd.exe 90 PID 3892 wrote to memory of 3168 3892 cmd.exe 90 PID 3892 wrote to memory of 3168 3892 cmd.exe 90 PID 3936 wrote to memory of 3308 3936 RtkBtManServ.exe 92 PID 3936 wrote to memory of 3308 3936 RtkBtManServ.exe 92 PID 3308 wrote to memory of 3924 3308 WScript.exe 93 PID 3308 wrote to memory of 3924 3308 WScript.exe 93 PID 3924 wrote to memory of 432 3924 cmd.exe 95 PID 3924 wrote to memory of 432 3924 cmd.exe 95 PID 3924 wrote to memory of 432 3924 cmd.exe 95 PID 3936 wrote to memory of 840 3936 RtkBtManServ.exe 96 PID 3936 wrote to memory of 840 3936 RtkBtManServ.exe 96 PID 840 wrote to memory of 4024 840 cmd.exe 98 PID 840 wrote to memory of 4024 840 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe"C:\Users\Admin\AppData\Local\Temp\0001c1409b360fc8e1b6933d20c7bfa42e1f5d7bc1593a5057a96930e0b53488.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\asdas.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\asdas.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs7LIsqCC4a/AX2b2RVR/YEUkVsAd21s1Zj3Q7+D+wBDqZXHiuUwqD+ulat5YCzOWXvJWtDoU7A9lCKly9ij2EI/e2+S7OW+qFJxtlQeFXgI2TuHiauFjXibHW/+xco2h6U=3⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\bfsvc.exeC:\Users\Admin\AppData\Local\Temp\bfsvc.exe /capture /Filename "C:\Users\Admin\AppData\Local\Temp\capture.png"6⤵
- Executes dropped EXE
PID:2984
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"6⤵
- Executes dropped EXE
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"6⤵
- Executes dropped EXE
PID:644
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵PID:4024
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sms.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sms.exe2⤵
- Executes dropped EXE
PID:2996
-