Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-06-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe
Resource
win7-20220414-en
General
-
Target
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe
-
Size
198KB
-
MD5
06881454143376beb76a127d1758524d
-
SHA1
4c6957bee8f43be7a44918f7a418270134bc4e9c
-
SHA256
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01
-
SHA512
abba15ced8006c48468b4375bded848c5e16cfa97006c10f09db716aac946f3d4c25f2a6f55ea7e1f473f83ba83f3cc25617ea159fd4be29c9ed9f517c0a3c67
Malware Config
Signatures
-
Processes:
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
GBLWiY2xaEn4czEIfadi5ODA.exepid process 616 GBLWiY2xaEn4czEIfadi5ODA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe -
Loads dropped DLL 1 IoCs
Processes:
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exepid process 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 ipinfo.io 22 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exeGBLWiY2xaEn4czEIfadi5ODA.exepid process 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe 616 GBLWiY2xaEn4czEIfadi5ODA.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exedescription pid process target process PID 1336 wrote to memory of 616 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe GBLWiY2xaEn4czEIfadi5ODA.exe PID 1336 wrote to memory of 616 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe GBLWiY2xaEn4czEIfadi5ODA.exe PID 1336 wrote to memory of 616 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe GBLWiY2xaEn4czEIfadi5ODA.exe PID 1336 wrote to memory of 616 1336 b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe GBLWiY2xaEn4czEIfadi5ODA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe"C:\Users\Admin\AppData\Local\Temp\b07997fa6d97fa62edb47fe65881fb8fd7cfc025b1ac4bd80688a43006533c01.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\Pictures\Adobe Films\GBLWiY2xaEn4czEIfadi5ODA.exe"C:\Users\Admin\Pictures\Adobe Films\GBLWiY2xaEn4czEIfadi5ODA.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f