Analysis
-
max time kernel
107s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 20:56
Behavioral task
behavioral1
Sample
ExternalRun.exe
Resource
win7-20220223-en
General
-
Target
ExternalRun.exe
-
Size
274KB
-
MD5
63525b6ba838d80f0eb16a666ff30de2
-
SHA1
b11d70bf65b2b82df2c4aa46ac9dfce3c308b568
-
SHA256
3c8acfa90eed5ab18fd669bea9d494d9fb96f964d9040ee03ff9889dbaada294
-
SHA512
0709a2bb5d23ede0347e684a6512f0c282de68e3e7f1800ea1544e2f737cd77333bb0a496f6a0489d32df60e7d37760225e1fcac8d9905ae1b84d3de8ee348eb
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/947512216133980311/ImHpeYlo_A0Yhi0saM66pMBO7iLHhGK_k5MBohq8Jg4tn4gMe7dTpw1qEItYNQR_c9kp
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3088-130-0x0000027B8D460000-0x0000027B8D4AA000-memory.dmp Discord_wb -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 freegeoip.app 13 freegeoip.app -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeExternalRun.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ExternalRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ExternalRun.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
ExternalRun.exetaskmgr.exepid process 3088 ExternalRun.exe 3088 ExternalRun.exe 3088 ExternalRun.exe 3088 ExternalRun.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
ExternalRun.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 3088 ExternalRun.exe Token: SeDebugPrivilege 3368 taskmgr.exe Token: SeSystemProfilePrivilege 3368 taskmgr.exe Token: SeCreateGlobalPrivilege 3368 taskmgr.exe Token: 33 3368 taskmgr.exe Token: SeIncBasePriorityPrivilege 3368 taskmgr.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
Processes:
taskmgr.exepid process 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe -
Suspicious use of SendNotifyMessage 50 IoCs
Processes:
taskmgr.exepid process 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe 3368 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExternalRun.exe"C:\Users\Admin\AppData\Local\Temp\ExternalRun.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage