Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-06-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe
Resource
win10v2004-20220414-en
General
-
Target
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe
-
Size
198KB
-
MD5
4162ac037f86abc4fcbe342bc957e971
-
SHA1
7f9cae6bb0f484e76efa718b0f6d5a63c626905c
-
SHA256
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8
-
SHA512
2c37f26e2e41bfbf9af0ef18a77bef741efb73fafec292b29cd46320b3d8680746249fb66dc7b11e5f9c5e3467ec7b8887c6d3c85a7f5ed0559a03bd3850749c
Malware Config
Extracted
privateloader
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
http://193.233.185.125/download/NiceProcessX64.bmp
http://193.233.185.125/download/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Signatures
-
Processes:
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
kiHxBXfbyCKTpZxRC6uCdGvy.exepid process 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe -
Loads dropped DLL 1 IoCs
Processes:
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exepid process 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ipinfo.io 18 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1640 1080 WerFault.exe 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exekiHxBXfbyCKTpZxRC6uCdGvy.exepid process 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe 1784 kiHxBXfbyCKTpZxRC6uCdGvy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exedescription pid process target process PID 1080 wrote to memory of 1784 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe kiHxBXfbyCKTpZxRC6uCdGvy.exe PID 1080 wrote to memory of 1784 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe kiHxBXfbyCKTpZxRC6uCdGvy.exe PID 1080 wrote to memory of 1784 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe kiHxBXfbyCKTpZxRC6uCdGvy.exe PID 1080 wrote to memory of 1784 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe kiHxBXfbyCKTpZxRC6uCdGvy.exe PID 1080 wrote to memory of 1640 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe WerFault.exe PID 1080 wrote to memory of 1640 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe WerFault.exe PID 1080 wrote to memory of 1640 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe WerFault.exe PID 1080 wrote to memory of 1640 1080 66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe"C:\Users\Admin\AppData\Local\Temp\66e523d5776ab9a33199942bce36b9ce642e07e5266eeb0f6f80e9a5c1a0e0d8.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\Pictures\Adobe Films\kiHxBXfbyCKTpZxRC6uCdGvy.exe"C:\Users\Admin\Pictures\Adobe Films\kiHxBXfbyCKTpZxRC6uCdGvy.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 14082⤵
- Program crash
PID:1640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f