Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-03-2022 18:13
Static task
static1
Behavioral task
behavioral1
Sample
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe
Resource
win7-20220223-en
General
-
Target
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe
-
Size
793KB
-
MD5
f559e77721d8cc5bd97e037c4b3472cc
-
SHA1
f6dda6d685285301e23fd51338d0977fb5e03a6e
-
SHA256
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d
-
SHA512
64d6e8d0bc9862f9eab80d0fa95fdbb42eab44efed4a90abe1a6a0c8b1a308b5940d90740beb211dd6c375b8dd1fb1706a76f484ccf439cfc3bb2ae0aacb3dd9
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/939927794656370699/MQUodH1jMxGoELXDI7vt3uVKvZAZN_FBkYRFlTiMVxHGCFnEzvPC7JNVH8-ESePeneQo
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
loader_2.exeexample.exepid process 3548 loader_2.exe 4024 example.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
loader_2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 loader_2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier loader_2.exe -
Kills process with taskkill 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3836 taskkill.exe 1880 taskkill.exe 1952 taskkill.exe 2588 taskkill.exe 4404 taskkill.exe 1308 taskkill.exe 4324 taskkill.exe 4612 taskkill.exe 712 taskkill.exe 3576 taskkill.exe 4700 taskkill.exe 4224 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
loader_2.exepid process 3548 loader_2.exe 3548 loader_2.exe 3548 loader_2.exe 3548 loader_2.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
loader_2.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3548 loader_2.exe Token: SeDebugPrivilege 712 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 2588 taskkill.exe Token: SeDebugPrivilege 4404 taskkill.exe Token: SeDebugPrivilege 3576 taskkill.exe Token: SeDebugPrivilege 4700 taskkill.exe Token: SeDebugPrivilege 1308 taskkill.exe Token: SeDebugPrivilege 3836 taskkill.exe Token: SeDebugPrivilege 4224 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 4612 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exeexample.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3744 wrote to memory of 3548 3744 c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe loader_2.exe PID 3744 wrote to memory of 3548 3744 c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe loader_2.exe PID 3744 wrote to memory of 4024 3744 c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe example.exe PID 3744 wrote to memory of 4024 3744 c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe example.exe PID 4024 wrote to memory of 616 4024 example.exe cmd.exe PID 4024 wrote to memory of 616 4024 example.exe cmd.exe PID 616 wrote to memory of 712 616 cmd.exe taskkill.exe PID 616 wrote to memory of 712 616 cmd.exe taskkill.exe PID 4024 wrote to memory of 2028 4024 example.exe cmd.exe PID 4024 wrote to memory of 2028 4024 example.exe cmd.exe PID 2028 wrote to memory of 1952 2028 cmd.exe taskkill.exe PID 2028 wrote to memory of 1952 2028 cmd.exe taskkill.exe PID 4024 wrote to memory of 2360 4024 example.exe cmd.exe PID 4024 wrote to memory of 2360 4024 example.exe cmd.exe PID 2360 wrote to memory of 2588 2360 cmd.exe taskkill.exe PID 2360 wrote to memory of 2588 2360 cmd.exe taskkill.exe PID 4024 wrote to memory of 2804 4024 example.exe cmd.exe PID 4024 wrote to memory of 2804 4024 example.exe cmd.exe PID 2804 wrote to memory of 3860 2804 cmd.exe sc.exe PID 2804 wrote to memory of 3860 2804 cmd.exe sc.exe PID 4024 wrote to memory of 4808 4024 example.exe cmd.exe PID 4024 wrote to memory of 4808 4024 example.exe cmd.exe PID 4808 wrote to memory of 4404 4808 cmd.exe taskkill.exe PID 4808 wrote to memory of 4404 4808 cmd.exe taskkill.exe PID 4024 wrote to memory of 4368 4024 example.exe cmd.exe PID 4024 wrote to memory of 4368 4024 example.exe cmd.exe PID 4024 wrote to memory of 800 4024 example.exe cmd.exe PID 4024 wrote to memory of 800 4024 example.exe cmd.exe PID 800 wrote to memory of 3576 800 cmd.exe taskkill.exe PID 800 wrote to memory of 3576 800 cmd.exe taskkill.exe PID 4024 wrote to memory of 4288 4024 example.exe cmd.exe PID 4024 wrote to memory of 4288 4024 example.exe cmd.exe PID 4288 wrote to memory of 4700 4288 cmd.exe taskkill.exe PID 4288 wrote to memory of 4700 4288 cmd.exe taskkill.exe PID 4024 wrote to memory of 2312 4024 example.exe cmd.exe PID 4024 wrote to memory of 2312 4024 example.exe cmd.exe PID 2312 wrote to memory of 1308 2312 cmd.exe taskkill.exe PID 2312 wrote to memory of 1308 2312 cmd.exe taskkill.exe PID 4024 wrote to memory of 4604 4024 example.exe cmd.exe PID 4024 wrote to memory of 4604 4024 example.exe cmd.exe PID 4604 wrote to memory of 1244 4604 cmd.exe sc.exe PID 4604 wrote to memory of 1244 4604 cmd.exe sc.exe PID 4024 wrote to memory of 2700 4024 example.exe cmd.exe PID 4024 wrote to memory of 2700 4024 example.exe cmd.exe PID 2700 wrote to memory of 3836 2700 cmd.exe taskkill.exe PID 2700 wrote to memory of 3836 2700 cmd.exe taskkill.exe PID 4024 wrote to memory of 4948 4024 example.exe cmd.exe PID 4024 wrote to memory of 4948 4024 example.exe cmd.exe PID 4024 wrote to memory of 4676 4024 example.exe cmd.exe PID 4024 wrote to memory of 4676 4024 example.exe cmd.exe PID 4676 wrote to memory of 4224 4676 cmd.exe taskkill.exe PID 4676 wrote to memory of 4224 4676 cmd.exe taskkill.exe PID 4024 wrote to memory of 1936 4024 example.exe cmd.exe PID 4024 wrote to memory of 1936 4024 example.exe cmd.exe PID 1936 wrote to memory of 1880 1936 cmd.exe taskkill.exe PID 1936 wrote to memory of 1880 1936 cmd.exe taskkill.exe PID 4024 wrote to memory of 1740 4024 example.exe cmd.exe PID 4024 wrote to memory of 1740 4024 example.exe cmd.exe PID 1740 wrote to memory of 4324 1740 cmd.exe taskkill.exe PID 1740 wrote to memory of 4324 1740 cmd.exe taskkill.exe PID 4024 wrote to memory of 3108 4024 example.exe cmd.exe PID 4024 wrote to memory of 3108 4024 example.exe cmd.exe PID 3108 wrote to memory of 4500 3108 cmd.exe sc.exe PID 3108 wrote to memory of 4500 3108 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe"C:\Users\Admin\AppData\Local\Temp\c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\loader_2.exe"C:\Users\Admin\AppData\Local\Temp\loader_2.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\example.exe"C:\Users\Admin\AppData\Local\Temp\example.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵PID:3860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:4368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3576 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵PID:1244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:4948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4224 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵PID:4500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4508
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
009ea83f03fdd2d1da3fc57e118f137f
SHA1e1f07d0577636f8df4e50d2e45b83dd1d17ef875
SHA256a4af83b6cfeb0471b5c38a3ca3a118d5bab056dc05db1883ddc751430140bb3c
SHA51232a0a12c3ce7046e6a2bcb45e958b2030fa158be51b3d485f9cf6b18a5c2c50e307c7ce928da74e3f0095de4c3a0999b6059deaf28a3632ce954f55fc4613fd7
-
MD5
009ea83f03fdd2d1da3fc57e118f137f
SHA1e1f07d0577636f8df4e50d2e45b83dd1d17ef875
SHA256a4af83b6cfeb0471b5c38a3ca3a118d5bab056dc05db1883ddc751430140bb3c
SHA51232a0a12c3ce7046e6a2bcb45e958b2030fa158be51b3d485f9cf6b18a5c2c50e307c7ce928da74e3f0095de4c3a0999b6059deaf28a3632ce954f55fc4613fd7
-
MD5
f16b30ce57b3d0678d55d91953597faa
SHA17348bfa2fd87b1e5f556c54fa650eb376c60006d
SHA256d4515c61a5b8ec675d401277f69a863e6ef01875e749e027ef6bde29674fc291
SHA512fe22efa8d7ac0688be13b3fa2e168c9adfc5afa5d39132213a45f1ea1b9d2cd550f15655885cd819c6b8f94381f69620281b38ec907c5d0070d4442baf99f448
-
MD5
f16b30ce57b3d0678d55d91953597faa
SHA17348bfa2fd87b1e5f556c54fa650eb376c60006d
SHA256d4515c61a5b8ec675d401277f69a863e6ef01875e749e027ef6bde29674fc291
SHA512fe22efa8d7ac0688be13b3fa2e168c9adfc5afa5d39132213a45f1ea1b9d2cd550f15655885cd819c6b8f94381f69620281b38ec907c5d0070d4442baf99f448