Analysis
-
max time kernel
153s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 15:13
Static task
static1
Behavioral task
behavioral1
Sample
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe
Resource
win7-20220414-en
General
-
Target
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe
-
Size
459KB
-
MD5
b2ef28ee87bc3d936e128faa4fd89bb8
-
SHA1
0f27b77ac9caac0dbfbb88acd02025766c72c64e
-
SHA256
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f
-
SHA512
5604591119b1a07d1bcfa2c2f365e3fa35c02871f1ebaa8c71b9a5b4ec75d9d73fc2b1073c3ecf282b575bbf8e9cd1d6a7ff050cdcceba5394a2cdfbad386bd2
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exepid Process 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{73063640-D64F-46CF-9DFF-B644BF81AF32}\\f5ea51da.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{73063640-D64F-46CF-9DFF-B644BF81AF32}\\f5ea51da.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exedescription pid Process procid_target PID 1920 set thread context of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 608 set thread context of 1380 608 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid Process 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe -
Suspicious behavior: MapViewOfSection 25 IoCs
Processes:
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exesvchost.exepid Process 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 596 svchost.exe 608 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid Process Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeSystemtimePrivilege 880 Token: SeBackupPrivilege 880 Token: SeRestorePrivilege 880 Token: SeShutdownPrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeUndockPrivilege 880 Token: SeManageVolumePrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 Token: SeSystemEnvironmentPrivilege 880 Token: SeAssignPrimaryTokenPrivilege 880 Token: SeIncreaseQuotaPrivilege 880 Token: SeSecurityPrivilege 880 Token: SeTakeOwnershipPrivilege 880 Token: SeLoadDriverPrivilege 880 Token: SeRestorePrivilege 880 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exepid Process 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid Process 596 svchost.exe -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
pid Process 608 816 816 -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exedescription pid Process procid_target PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1920 wrote to memory of 1220 1920 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 27 PID 1220 wrote to memory of 596 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 28 PID 1220 wrote to memory of 596 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 28 PID 1220 wrote to memory of 596 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 28 PID 1220 wrote to memory of 596 1220 128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe 28 PID 388 wrote to memory of 1276 388 14 PID 336 wrote to memory of 1380 336 29 PID 608 wrote to memory of 1380 608 29 PID 608 wrote to memory of 1380 608 29 PID 608 wrote to memory of 1380 608 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe"C:\Users\Admin\AppData\Local\Temp\128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe"C:\Users\Admin\AppData\Local\Temp\128a842ee4908af0586a6854ecd568f31d146957c67f9fc8e071fe3fac2f1c5f.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:596
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5375e8a08471dc6f85f3828488b1147b3
SHA11941484ac710fc301a7d31d6f1345e32a21546af
SHA2564c86b238e64ecfaabe322a70fd78db229a663ccc209920f3385596a6e3205f78
SHA5125ba29db13723ddf27b265a4548606274b850d076ae1f050c64044f8ccd020585ad766c85c3e20003a22f356875f76fb3679c89547b0962580d8e5a42b082b9a8
-
Filesize
92KB
MD5c588b63e86ee2299c60f4aebfe4a7462
SHA1f81b17fc7d97718833cd6e1ad7266aaab812a5cf
SHA25639ebac8550b02b3ee0629bb99e86ccc3bfe031474387eb7173c42a24d9a72b98
SHA512d20be9d9d7881f30fd2000b223f478a51872a5e9af95462eead16f5c6a54f20096d6aefb0fe3c0ffe80c791bad918e929003574fc668389c2013775ca6ed2a26