Analysis
-
max time kernel
71s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 19:38
Static task
static1
Behavioral task
behavioral1
Sample
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe
Resource
win7-20220414-en
General
-
Target
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe
-
Size
1.4MB
-
MD5
69909e44ed7ac944e7511ea85f1ecd95
-
SHA1
55db4bc03dd1e3d103158ebd5b3f7c32c87e5052
-
SHA256
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7
-
SHA512
5927bde2aed44644bb5c8d4fb5b5c48df705187a6a85538abf2d5bdc468c6d3c1bb95eb744dccc673dc3561981fd6ac7fec3971064f4fe391940338da69f5ebd
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1816 taskkill.exe -
Processes:
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exetaskkill.exedescription pid process Token: SeCreateTokenPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeAssignPrimaryTokenPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeLockMemoryPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeIncreaseQuotaPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeMachineAccountPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeTcbPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeSecurityPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeTakeOwnershipPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeLoadDriverPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeSystemProfilePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeSystemtimePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeProfSingleProcessPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeIncBasePriorityPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeCreatePagefilePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeCreatePermanentPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeBackupPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeRestorePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeShutdownPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeDebugPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeAuditPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeSystemEnvironmentPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeChangeNotifyPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeRemoteShutdownPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeUndockPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeSyncAgentPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeEnableDelegationPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeManageVolumePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeImpersonatePrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeCreateGlobalPrivilege 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: 31 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: 32 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: 33 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: 34 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: 35 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe Token: SeDebugPrivilege 1816 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.execmd.exedescription pid process target process PID 4060 wrote to memory of 4752 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe cmd.exe PID 4060 wrote to memory of 4752 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe cmd.exe PID 4060 wrote to memory of 4752 4060 2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe cmd.exe PID 4752 wrote to memory of 1816 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 1816 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 1816 4752 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe"C:\Users\Admin\AppData\Local\Temp\2d5d571c786c7a6d5c297e3c5ee6e7d7f00ac3451954834336a9b1bcaef8b1f7.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken