Analysis
-
max time kernel
4294211s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
07-03-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
Resource
win10v2004-en-20220113
General
-
Target
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
-
Size
364KB
-
MD5
b3891a07e539a8e51fffae792aea861e
-
SHA1
18a849e869017c98ec260e4ccf809f51b38a79da
-
SHA256
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a
-
SHA512
c549290e32936cc9f0ee5bf35f602d4dbb15aad2eccda6a140e715f69ac63bd92d5e8d27ad32e97de66685300bdfdfa2d65a4134a2e6a75b91f34e98b16b30bf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1112 1.exe 568 gfdgfd.Exe 1676 dll.exe -
resource yara_rule behavioral1/memory/1076-56-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1076-59-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1076-60-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x000a0000000139f8-63.dat upx behavioral1/files/0x000a0000000139f8-64.dat upx behavioral1/files/0x000a0000000139f8-65.dat upx -
Loads dropped DLL 6 IoCs
pid Process 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 1112 1.exe 1112 1.exe 568 gfdgfd.Exe 568 gfdgfd.Exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\windows\CurrentVersion\Run dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\dll = "C:\\Users\\Admin\\AppData\\Roaming\\{0664ECA6-B456-E195-1216-E87E3554727E}\\dll.exe" dll.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 964 set thread context of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\LimeWire\Shared\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\eMule\Incoming\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Morpheus\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Bearshare\Shared\ Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Kazaa\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Ares\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1676 dll.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 1112 1.exe 568 gfdgfd.Exe 568 gfdgfd.Exe 1676 dll.exe 1676 dll.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1076 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 27 PID 964 wrote to memory of 1112 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 28 PID 964 wrote to memory of 1112 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 28 PID 964 wrote to memory of 1112 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 28 PID 964 wrote to memory of 1112 964 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 28 PID 1112 wrote to memory of 568 1112 1.exe 29 PID 1112 wrote to memory of 568 1112 1.exe 29 PID 1112 wrote to memory of 568 1112 1.exe 29 PID 1112 wrote to memory of 568 1112 1.exe 29 PID 568 wrote to memory of 1676 568 gfdgfd.Exe 30 PID 568 wrote to memory of 1676 568 gfdgfd.Exe 30 PID 568 wrote to memory of 1676 568 gfdgfd.Exe 30 PID 568 wrote to memory of 1676 568 gfdgfd.Exe 30 PID 568 wrote to memory of 1988 568 gfdgfd.Exe 31 PID 568 wrote to memory of 1988 568 gfdgfd.Exe 31 PID 568 wrote to memory of 1988 568 gfdgfd.Exe 31 PID 568 wrote to memory of 1988 568 gfdgfd.Exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe"C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe/scomma "C:\Users\Admin\AppData\Local\Temp\1SgrSCbsMx.ini"2⤵PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\gfdgfd.Exe"C:\Users\Admin\AppData\Local\Temp\gfdgfd.Exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\{0664ECA6-B456-E195-1216-E87E3554727E}\dll.exeC:\Users\Admin\AppData\Roaming\{0664ECA6-B456-E195-1216-E87E3554727E}\dll.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\x.bat4⤵PID:1988
-
-
-