Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-06-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe
Resource
win10v2004-20220414-en
General
-
Target
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe
-
Size
197KB
-
MD5
1de223e856e80958bda73c56c85c232e
-
SHA1
b357102a4dc4217c11e9e1f2f96e2c1feaa3f4d6
-
SHA256
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1
-
SHA512
d1bde2a8f7560f62ed1032436ef0bab12d72b7038ffd740738e4ca6fa1ece7e4ddbcf1ba6c2d34d5a65152c72163c1fd98527ee9b3dd8bfdeb602489e9137bd1
Malware Config
Signatures
-
Processes:
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Puu9lXFYbbl_amkfKioYXS65.exepid process 624 Puu9lXFYbbl_amkfKioYXS65.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe -
Loads dropped DLL 1 IoCs
Processes:
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exepid process 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ipinfo.io 21 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1980 1668 WerFault.exe be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exePuu9lXFYbbl_amkfKioYXS65.exepid process 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe 624 Puu9lXFYbbl_amkfKioYXS65.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exedescription pid process target process PID 1668 wrote to memory of 624 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Puu9lXFYbbl_amkfKioYXS65.exe PID 1668 wrote to memory of 624 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Puu9lXFYbbl_amkfKioYXS65.exe PID 1668 wrote to memory of 624 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Puu9lXFYbbl_amkfKioYXS65.exe PID 1668 wrote to memory of 624 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe Puu9lXFYbbl_amkfKioYXS65.exe PID 1668 wrote to memory of 1980 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe WerFault.exe PID 1668 wrote to memory of 1980 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe WerFault.exe PID 1668 wrote to memory of 1980 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe WerFault.exe PID 1668 wrote to memory of 1980 1668 be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe"C:\Users\Admin\AppData\Local\Temp\be42e10757aca35e7d0c6b553a856803bcadd5d12ac828197e54c369a0519cd1.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\Pictures\Adobe Films\Puu9lXFYbbl_amkfKioYXS65.exe"C:\Users\Admin\Pictures\Adobe Films\Puu9lXFYbbl_amkfKioYXS65.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 13962⤵
- Program crash
PID:1980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f