Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
17-03-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe
Resource
win10v2004-20220310-en
General
-
Target
db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe
-
Size
456KB
-
MD5
0ce6472a1caf1e18f0c87c6f405c6441
-
SHA1
d6f0f1a7cfb43cadeace56f7624e3ca91bb46b8f
-
SHA256
db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b
-
SHA512
5398f90b48a360f3ee4b8e5668f561fea209abdbdd426e58617d498257a4a204fb7a2687a771f1d907c3adee4b03511bb459ae6acec2401f6adf257a2e9be510
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2472 tmp165F.tmp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation tmp165F.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2472 tmp165F.tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Testings.exe = "C:\\Users\\Admin\\AppData\\RoamingTestings.exe" db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe Set value (data) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2316 PING.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 1136 msedge.exe 1136 msedge.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe 2472 tmp165F.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe Token: SeDebugPrivilege 2472 tmp165F.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1744 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 88 PID 1700 wrote to memory of 1744 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 88 PID 1744 wrote to memory of 2316 1744 cmd.exe 90 PID 1744 wrote to memory of 2316 1744 cmd.exe 90 PID 1700 wrote to memory of 2472 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 91 PID 1700 wrote to memory of 2472 1700 db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe 91 PID 2472 wrote to memory of 4284 2472 tmp165F.tmp.exe 92 PID 2472 wrote to memory of 4284 2472 tmp165F.tmp.exe 92 PID 2472 wrote to memory of 5096 2472 tmp165F.tmp.exe 93 PID 2472 wrote to memory of 5096 2472 tmp165F.tmp.exe 93 PID 5096 wrote to memory of 4528 5096 msedge.exe 94 PID 5096 wrote to memory of 4528 5096 msedge.exe 94 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1208 5096 msedge.exe 95 PID 5096 wrote to memory of 1136 5096 msedge.exe 96 PID 5096 wrote to memory of 1136 5096 msedge.exe 96 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97 PID 5096 wrote to memory of 2120 5096 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 5 -w 50003⤵
- Runs ping.exe
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" http://127.0.0.1:126033⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x9c,0x104,0x7ffe778346f8,0x7ffe77834708,0x7ffe778347184⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:24⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2920 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3100 /prefetch:84⤵PID:2120
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD505d3edc56331ce405e49ad2fc4e6c01e
SHA10b0491f9b654bb0bc41929456ba2943141be6711
SHA256ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14
SHA512b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26
-
Filesize
1.5MB
MD505d3edc56331ce405e49ad2fc4e6c01e
SHA10b0491f9b654bb0bc41929456ba2943141be6711
SHA256ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14
SHA512b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26
-
Filesize
1.6MB
MD5616827a61d7a49ce5389c5d96443e35d
SHA1d522ee5607e122e775d77641dba09711146db739
SHA25654d4025bc175de5367d0ace1a78fec7edf06b642892691cf85afb02b8ab166d5
SHA512fd6a53cb9851e56b8dc6a40627058852f2949688b73dacf6f3e0fcf932453b8c52a3bfefb12c80c38397a89f1038ad8fad329ea2798b86457ce5d8fe7ba87312