Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
07-03-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
Resource
win10v2004-en-20220113
General
-
Target
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe
-
Size
364KB
-
MD5
b3891a07e539a8e51fffae792aea861e
-
SHA1
18a849e869017c98ec260e4ccf809f51b38a79da
-
SHA256
f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a
-
SHA512
c549290e32936cc9f0ee5bf35f602d4dbb15aad2eccda6a140e715f69ac63bd92d5e8d27ad32e97de66685300bdfdfa2d65a4134a2e6a75b91f34e98b16b30bf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2644 1.exe 4824 gfdgfd.Exe 4624 dll.exe -
resource yara_rule behavioral2/memory/384-132-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/384-134-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/384-135-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/files/0x000800000001e7e1-137.dat upx behavioral2/files/0x000800000001e7e1-138.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\windows\CurrentVersion\Run dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dll = "C:\\Users\\Admin\\AppData\\Roaming\\{0664ECA6-B456-E195-1216-E87E3554727E}\\dll.exe" dll.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\eMule\Incoming\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Morpheus\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Bearshare\Shared\ Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Kazaa\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\Ares\My Shared Folder\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe File created C:\Program Files\LimeWire\Shared\Adobe Photoshop CS6 Keygen.exe gfdgfd.Exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4624 dll.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 2644 1.exe 4824 gfdgfd.Exe 4824 gfdgfd.Exe 4624 dll.exe 4624 dll.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 384 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 79 PID 532 wrote to memory of 2644 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 85 PID 532 wrote to memory of 2644 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 85 PID 532 wrote to memory of 2644 532 f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe 85 PID 2644 wrote to memory of 4824 2644 1.exe 86 PID 2644 wrote to memory of 4824 2644 1.exe 86 PID 2644 wrote to memory of 4824 2644 1.exe 86 PID 4824 wrote to memory of 4624 4824 gfdgfd.Exe 87 PID 4824 wrote to memory of 4624 4824 gfdgfd.Exe 87 PID 4824 wrote to memory of 4624 4824 gfdgfd.Exe 87 PID 4824 wrote to memory of 444 4824 gfdgfd.Exe 88 PID 4824 wrote to memory of 444 4824 gfdgfd.Exe 88 PID 4824 wrote to memory of 444 4824 gfdgfd.Exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe"C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\f714e0b0362ddc0ff1fccc388f5011824439b433a8dca38e305a3da1f354a85a.exe/scomma "C:\Users\Admin\AppData\Local\Temp\IubKJulcMD.ini"2⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\gfdgfd.Exe"C:\Users\Admin\AppData\Local\Temp\gfdgfd.Exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Roaming\{0664ECA6-B456-E195-1216-E87E3554727E}\dll.exeC:\Users\Admin\AppData\Roaming\{0664ECA6-B456-E195-1216-E87E3554727E}\dll.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\x.bat4⤵PID:444
-
-
-