Overview
overview
10Static
static
107zS8A52FD1...f3.exe
windows7_x64
87zS8A52FD1...f3.exe
windows10-2004_x64
87zS8A52FD1...62.exe
windows7_x64
77zS8A52FD1...62.exe
windows10-2004_x64
77zS8A52FD1...9a.exe
windows7_x64
107zS8A52FD1...9a.exe
windows10-2004_x64
107zS8A52FD1...8a.exe
windows7_x64
107zS8A52FD1...8a.exe
windows10-2004_x64
107zS8A52FD1...f5.exe
windows7_x64
17zS8A52FD1...f5.exe
windows10-2004_x64
17zS8A52FD1...68.exe
windows7_x64
77zS8A52FD1...68.exe
windows10-2004_x64
77zS8A52FD1...41.exe
windows7_x64
77zS8A52FD1...41.exe
windows10-2004_x64
77zS8A52FD1...cd.exe
windows7_x64
87zS8A52FD1...cd.exe
windows10-2004_x64
87zS8A52FD1...71.exe
windows7_x64
57zS8A52FD1...71.exe
windows10-2004_x64
57zS8A52FD1...9c.exe
windows7_x64
107zS8A52FD1...9c.exe
windows10-2004_x64
107zS8A52FD1...0d.exe
windows7_x64
17zS8A52FD1...0d.exe
windows10-2004_x64
17zS8A52FD1...ff.exe
windows7_x64
107zS8A52FD1...ff.exe
windows10-2004_x64
107zS8A52FD1...68.exe
windows7_x64
107zS8A52FD1...68.exe
windows10-2004_x64
107zS8A52FD1...-1.dll
windows7_x64
37zS8A52FD1...-1.dll
windows10-2004_x64
37zS8A52FD1...-6.dll
windows7_x64
37zS8A52FD1...-6.dll
windows10-2004_x64
37zS8A52FD1...-1.dll
windows7_x64
17zS8A52FD1...-1.dll
windows10-2004_x64
1Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-06-2022 14:12
Behavioral task
behavioral1
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win10v2004-20220414-en
General
-
Target
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
-
Size
157KB
-
MD5
13fd49b3e1c7abe59a321d34a983fa1d
-
SHA1
d68d156faa3dd348d89064c1b5026990b25d9c73
-
SHA256
9542ce09286e69fe0a1270f0b017639139ece09287496dfe07b7c44ad897c476
-
SHA512
ddd506fda604e68063268d644963650bc3e0fe987f59c52a08ed2c82ae5dedce1789a378645e8f7f851c74f75b8ee8ed80efb2c0c00ebdb6bfa5933d8ad0f4b6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
458020.exepid process 1088 458020.exe -
Loads dropped DLL 2 IoCs
Processes:
62a1ea227dc1c_17ee33ef3.exepid process 1172 62a1ea227dc1c_17ee33ef3.exe 1172 62a1ea227dc1c_17ee33ef3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
458020.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 458020.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 458020.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
458020.exepid process 1088 458020.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
62a1ea227dc1c_17ee33ef3.exe458020.exedescription pid process Token: SeDebugPrivilege 1172 62a1ea227dc1c_17ee33ef3.exe Token: SeDebugPrivilege 1088 458020.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
62a1ea227dc1c_17ee33ef3.exedescription pid process target process PID 1172 wrote to memory of 1088 1172 62a1ea227dc1c_17ee33ef3.exe 458020.exe PID 1172 wrote to memory of 1088 1172 62a1ea227dc1c_17ee33ef3.exe 458020.exe PID 1172 wrote to memory of 1088 1172 62a1ea227dc1c_17ee33ef3.exe 458020.exe PID 1172 wrote to memory of 1088 1172 62a1ea227dc1c_17ee33ef3.exe 458020.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea227dc1c_17ee33ef3.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea227dc1c_17ee33ef3.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\458020.exe"C:\Users\Admin\AppData\Roaming\458020.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5b68ab152574dd5a027364ced6a734bd0
SHA1a0900371bac1e0774a490d627a03b402a43c793a
SHA256b48493fbfda4896a251b09565dd87c271879a98f8e85b8b25d5f7e9dfb9ca1a0
SHA5124282eb5de1086c903f5de8cf41486770ec746510d18579489b2b8125944cbd8323cb9751d704362dcc74b022ec0589d2962c958ffbd5a9c7d0633551db427086
-
Filesize
291KB
MD5b68ab152574dd5a027364ced6a734bd0
SHA1a0900371bac1e0774a490d627a03b402a43c793a
SHA256b48493fbfda4896a251b09565dd87c271879a98f8e85b8b25d5f7e9dfb9ca1a0
SHA5124282eb5de1086c903f5de8cf41486770ec746510d18579489b2b8125944cbd8323cb9751d704362dcc74b022ec0589d2962c958ffbd5a9c7d0633551db427086
-
Filesize
291KB
MD5b68ab152574dd5a027364ced6a734bd0
SHA1a0900371bac1e0774a490d627a03b402a43c793a
SHA256b48493fbfda4896a251b09565dd87c271879a98f8e85b8b25d5f7e9dfb9ca1a0
SHA5124282eb5de1086c903f5de8cf41486770ec746510d18579489b2b8125944cbd8323cb9751d704362dcc74b022ec0589d2962c958ffbd5a9c7d0633551db427086
-
Filesize
291KB
MD5b68ab152574dd5a027364ced6a734bd0
SHA1a0900371bac1e0774a490d627a03b402a43c793a
SHA256b48493fbfda4896a251b09565dd87c271879a98f8e85b8b25d5f7e9dfb9ca1a0
SHA5124282eb5de1086c903f5de8cf41486770ec746510d18579489b2b8125944cbd8323cb9751d704362dcc74b022ec0589d2962c958ffbd5a9c7d0633551db427086