Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
10-03-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe
Resource
win7-en-20211208
General
-
Target
55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe
-
Size
3.0MB
-
MD5
09fb8646753f7041cb0dc124b3c571cf
-
SHA1
d41f962c8b308802635a446d1637a1316be54da1
-
SHA256
55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a
-
SHA512
7e0bc327c63acfc77c4276b6e7cffdd6514a4512fe76ebed360c629d94511f20dd0368c6220a21c40e1bb64b53e9a86ccb971a4c38c5cdf813a431716b15a536
Malware Config
Signatures
-
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/files/0x000300000000072f-149.dat WebBrowserPassView behavioral2/files/0x000300000000072f-150.dat WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/files/0x000300000000072f-149.dat Nirsoft behavioral2/files/0x000300000000072f-150.dat Nirsoft behavioral2/files/0x0003000000000729-158.dat Nirsoft behavioral2/files/0x0003000000000729-159.dat Nirsoft behavioral2/files/0x000300000000072d-164.dat Nirsoft behavioral2/files/0x000300000000072d-165.dat Nirsoft -
Executes dropped EXE 6 IoCs
pid Process 4848 RtkBtManServ.exe 4780 snuvcdsm.exe 1272 winhlp32.exe 1376 splwow64.exe 4764 hh.exe 680 xwizard.exe -
resource yara_rule behavioral2/files/0x0003000000000725-154.dat upx behavioral2/files/0x0003000000000725-155.dat upx behavioral2/files/0x000300000000072b-157.dat upx behavioral2/files/0x000300000000072b-156.dat upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation RtkBtManServ.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api64.ipify.org 11 api64.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings RtkBtManServ.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4780 snuvcdsm.exe 4780 snuvcdsm.exe 4780 snuvcdsm.exe 4780 snuvcdsm.exe 4764 hh.exe 4764 hh.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe 680 xwizard.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4848 RtkBtManServ.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4848 1656 55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe 81 PID 1656 wrote to memory of 4848 1656 55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe 81 PID 4848 wrote to memory of 4584 4848 RtkBtManServ.exe 82 PID 4848 wrote to memory of 4584 4848 RtkBtManServ.exe 82 PID 4584 wrote to memory of 2236 4584 WScript.exe 83 PID 4584 wrote to memory of 2236 4584 WScript.exe 83 PID 2236 wrote to memory of 4780 2236 cmd.exe 85 PID 2236 wrote to memory of 4780 2236 cmd.exe 85 PID 2236 wrote to memory of 4780 2236 cmd.exe 85 PID 4848 wrote to memory of 3972 4848 RtkBtManServ.exe 86 PID 4848 wrote to memory of 3972 4848 RtkBtManServ.exe 86 PID 3972 wrote to memory of 764 3972 WScript.exe 87 PID 3972 wrote to memory of 764 3972 WScript.exe 87 PID 764 wrote to memory of 1272 764 cmd.exe 89 PID 764 wrote to memory of 1272 764 cmd.exe 89 PID 764 wrote to memory of 1272 764 cmd.exe 89 PID 764 wrote to memory of 1376 764 cmd.exe 91 PID 764 wrote to memory of 1376 764 cmd.exe 91 PID 764 wrote to memory of 1376 764 cmd.exe 91 PID 764 wrote to memory of 4764 764 cmd.exe 90 PID 764 wrote to memory of 4764 764 cmd.exe 90 PID 764 wrote to memory of 4764 764 cmd.exe 90 PID 4848 wrote to memory of 2336 4848 RtkBtManServ.exe 92 PID 4848 wrote to memory of 2336 4848 RtkBtManServ.exe 92 PID 2336 wrote to memory of 4000 2336 WScript.exe 93 PID 2336 wrote to memory of 4000 2336 WScript.exe 93 PID 4000 wrote to memory of 680 4000 cmd.exe 95 PID 4000 wrote to memory of 680 4000 cmd.exe 95 PID 4000 wrote to memory of 680 4000 cmd.exe 95 PID 4848 wrote to memory of 5112 4848 RtkBtManServ.exe 96 PID 4848 wrote to memory of 5112 4848 RtkBtManServ.exe 96 PID 5112 wrote to memory of 1692 5112 cmd.exe 98 PID 5112 wrote to memory of 1692 5112 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe"C:\Users\Admin\AppData\Local\Temp\55e0722ff82fa927a04cb6911c3726b78e6b892d400753d853d0ddbc7dba4b2a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4iWQts1PND+kGJ4xdmGirFtT5W3OXFMbjE8CmdHgtOm0xo8eWTYs60ZjZMZYNO9Oj+IEZX5hTZz71kfTdlEjihNmMmWELE++ykkeW58BqUkHKYnClrsLhUECbONhhqWho=2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"5⤵
- Executes dropped EXE
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"5⤵
- Executes dropped EXE
PID:1376
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat4⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:1692
-
-
-