Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
13-03-2022 11:32
Static task
static1
Behavioral task
behavioral1
Sample
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
Resource
win7-20220311-en
General
-
Target
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
-
Size
6.0MB
-
MD5
d24fbb35cf9c6f4f53bfee6043f07a6e
-
SHA1
01a84ddbe70dbaa93bc840637ac3c1799fa0e24d
-
SHA256
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8
-
SHA512
2ad5422014450939805f04189f4f72850728e82eff16ae612f03b1c8e34f14f4bb1bac9fabde63f9be3e407d37a3b664cfb61272d400c4eb4e213c1579e62715
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral2/files/0x0006000000021e8e-150.dat family_babadeda behavioral2/memory/4488-250-0x00000000043D0000-0x00000000083D0000-memory.dmp family_babadeda -
Executes dropped EXE 8 IoCs
pid Process 4672 setup.exe 4652 IrfanViewStreamer.exe 2468 md8_8eus.exe 2940 KiffApp2.exe 4216 ifhvvyy.exe 2388 jfiag3g_gg.exe 4488 IVStreamer.exe 216 jfiag3g_gg.exe -
resource yara_rule behavioral2/files/0x0006000000021e9b-144.dat upx behavioral2/files/0x0006000000021e9b-145.dat upx behavioral2/files/0x0007000000021e9b-152.dat upx behavioral2/files/0x0007000000021e9b-153.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe -
Loads dropped DLL 1 IoCs
pid Process 4488 IVStreamer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" ifhvvyy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\setup.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000021e86-136.dat nsis_installer_1 behavioral2/files/0x0006000000021e86-136.dat nsis_installer_2 behavioral2/files/0x0006000000021e86-143.dat nsis_installer_1 behavioral2/files/0x0006000000021e86-143.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 jfiag3g_gg.exe 216 jfiag3g_gg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeManageVolumePrivilege 2468 md8_8eus.exe Token: SeManageVolumePrivilege 2468 md8_8eus.exe Token: SeManageVolumePrivilege 2468 md8_8eus.exe Token: SeDebugPrivilege 4488 IVStreamer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4672 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 82 PID 1448 wrote to memory of 4672 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 82 PID 1448 wrote to memory of 4672 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 82 PID 1448 wrote to memory of 4652 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 83 PID 1448 wrote to memory of 4652 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 83 PID 1448 wrote to memory of 4652 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 83 PID 1448 wrote to memory of 2468 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 84 PID 1448 wrote to memory of 2468 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 84 PID 1448 wrote to memory of 2468 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 84 PID 1448 wrote to memory of 2940 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 85 PID 1448 wrote to memory of 2940 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 85 PID 1448 wrote to memory of 4216 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 86 PID 1448 wrote to memory of 4216 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 86 PID 1448 wrote to memory of 4216 1448 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 86 PID 2940 wrote to memory of 4828 2940 KiffApp2.exe 87 PID 2940 wrote to memory of 4828 2940 KiffApp2.exe 87 PID 4216 wrote to memory of 2388 4216 ifhvvyy.exe 89 PID 4216 wrote to memory of 2388 4216 ifhvvyy.exe 89 PID 4216 wrote to memory of 2388 4216 ifhvvyy.exe 89 PID 4652 wrote to memory of 4488 4652 IrfanViewStreamer.exe 90 PID 4652 wrote to memory of 4488 4652 IrfanViewStreamer.exe 90 PID 4652 wrote to memory of 4488 4652 IrfanViewStreamer.exe 90 PID 4216 wrote to memory of 216 4216 ifhvvyy.exe 91 PID 4216 wrote to memory of 216 4216 ifhvvyy.exe 91 PID 4216 wrote to memory of 216 4216 ifhvvyy.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Company\NewProduct\setup.exe"C:\Program Files (x86)\Company\NewProduct\setup.exe"2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exeC:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll3⤵PID:4828
-
-
-
C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-