Analysis

  • max time kernel
    4294222s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    20-03-2022 03:16

General

  • Target

    tmp.exe

  • Size

    121KB

  • MD5

    b20ca6fe5b3bee70b53659f5faa67363

  • SHA1

    bccd58ad085f34263a2cc4c3763cc8494f1b96d7

  • SHA256

    2feec256a92e51a00f8ed6546bac741beb33beec29225bf74eba71cb6e8562a0

  • SHA512

    24a72e3834004af4fe432c9b616a8e3d3c14c50b9fbba70c70e2f9919cdfcf5e204c5e4c53f78e82c7d18ca764408654143b3ab0fa3e943070b6ec6355156ab1

Score
10/10

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=jewgod

Wallets

DDB4ERa4pkhQpEzTM2tqH5erkh3kiwsYzi

rMqpEtFcgkDk4Ud5MkPjS2osTabHTYvyQW

0x4f44b62930873e9621d184124bbac2332095B506

XuBivrvExbRDVuxvkQmUEvrTekGE8TqjZn

TLkgaCYHhRAA8JUkDrVAJkG2YLU9ENo2He

t1JZTeSL7rfeM6EFKeHgTXAmeo6duwpS1y7

GAKPS6Z755ZSPBR56BIQVWRVIMHI3WFG3FYMUILI3KT66SM6JE7RY3GM

44r9pF77DzZCr8p9mH3WfqE6CwkYQ9SeB8Kze4ATLgXajcQsBwRrSvvHiaptf5SV5tctJ1b2PAiRgKZpeDX8tXiG1xzXqWw

18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ

18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ

0x8ffc221927Fba7F6AF76ddB34079DB81e33522a0

Ltc1q5kk8mmxz00950w5xr79294ekx9uwgf2nc49k9u

ronin:faf1e8b8f87de6e4f6a62dc0b7eaf780ca7b54a0

P1051297956

R902735303552

G561982719682

Z961119277510

H857611132936

X414492391445

[email protected]

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Creates scheduled task(s)
      PID:1440
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5596E2E6-4F6A-4C1A-B845-BB05FD0ECB2C} S-1-5-21-2199625441-3471261906-229485034-1000:DRLQIXCW\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Executes dropped EXE
      PID:1948
    • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Executes dropped EXE
      PID:1696
    • C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      C:\Users\Admin\AppData\Local\CrashDumps\subst.exe
      2⤵
      • Executes dropped EXE
      PID:1668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/776-54-0x00000000749A1000-0x00000000749A3000-memory.dmp

    Filesize

    8KB