Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-06-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
Auto Block.exe
Resource
win7-20220414-en
General
-
Target
Auto Block.exe
-
Size
2.2MB
-
MD5
006f5bbb2e6f9ce7d38edad078e753ba
-
SHA1
ae6bcb7f694bee6e52be7e7dc75a1d9ced78f75f
-
SHA256
98f61a34d1b53907d24096b09b5530b80ca42ce9dd4c50eafcc6fab3f45a0119
-
SHA512
f4e6aafe806fc71a728a500fa80cce83044bbe979252228b74e60b88f73ded979e917cbef1a987db176f323b6027298de102f4e867fb99ffe28c1b50d667bfff
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/987320469264928788/XHGBPVVk0PqB5Bug7qHP2xnrZN4CfIIFQe0thEyFCmF2MEQleEN98ae4oIo8Q6KdiaA_
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Insidious.exeБХ.exepid process 1088 Insidious.exe 4056 БХ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Auto Block.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Auto Block.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 freegeoip.app 6 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Insidious.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Insidious.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Insidious.exe -
Modifies registry class 1 IoCs
Processes:
Auto Block.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Auto Block.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Insidious.exepid process 1088 Insidious.exe 1088 Insidious.exe 1088 Insidious.exe 1088 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Insidious.exedescription pid process Token: SeDebugPrivilege 1088 Insidious.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
БХ.exepid process 4056 БХ.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
БХ.exepid process 4056 БХ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
БХ.exepid process 4056 БХ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Auto Block.exedescription pid process target process PID 916 wrote to memory of 1088 916 Auto Block.exe Insidious.exe PID 916 wrote to memory of 1088 916 Auto Block.exe Insidious.exe PID 916 wrote to memory of 4056 916 Auto Block.exe БХ.exe PID 916 wrote to memory of 4056 916 Auto Block.exe БХ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Auto Block.exe"C:\Users\Admin\AppData\Local\Temp\Auto Block.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\БХ.exe"C:\Users\Admin\AppData\Local\Temp\БХ.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD59dff4650d113fe21dcc45c13ef90defd
SHA11d45ce5878d6ed0ac9b03588a9aafad752e15db3
SHA256ba8e080a84946ed54cb2b10247081c845c72f1c9809258a643c6e8aeff0e3d99
SHA5128b37d92863ed81fd53268800f745766b43e57b502140ad1a394e0be069f3a2631e01947e79712cba3575ee0aa59081bd1461ecfa606aae3e2331706477b02f17
-
Filesize
274KB
MD59dff4650d113fe21dcc45c13ef90defd
SHA11d45ce5878d6ed0ac9b03588a9aafad752e15db3
SHA256ba8e080a84946ed54cb2b10247081c845c72f1c9809258a643c6e8aeff0e3d99
SHA5128b37d92863ed81fd53268800f745766b43e57b502140ad1a394e0be069f3a2631e01947e79712cba3575ee0aa59081bd1461ecfa606aae3e2331706477b02f17
-
Filesize
1.2MB
MD55fdb43b73957e39125b2005848c23b82
SHA10769336c1254b44b87c7ec881f73c149ba95d406
SHA256454a12fe83683aede8ee95934b45d7cb4ecde8315496b42e280614dca3b6c299
SHA5125a623d429be286f4c95c0597e766a5723002d752a93eec5f709bc9ce28309dbbe5cdb2cf118360ad607480d5d862ad67d76fdeedadf026d5649777bdf6f7aad0