Analysis
-
max time kernel
60s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
17-08-2022 00:12
Behavioral task
behavioral1
Sample
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe
Resource
win7-20220812-es
Behavioral task
behavioral2
Sample
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe
Resource
win10v2004-20220812-es
General
-
Target
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe
-
Size
351KB
-
MD5
04f9e4977cb7f90334d5bf0ccb6c80ce
-
SHA1
e1328a2fc2d2d50c33e74ab8e2048dc2afaa0e2a
-
SHA256
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4
-
SHA512
259644c17b4a4e93e2ca743edfd28dc735a07d2c5f4c17e174018b9126c8a6300751b2fb9750f59d0d84d144f09948db6582f70aeae7ff1f8712fc91d178d299
Malware Config
Extracted
privateloader
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/1004293542186848319/1006848237547831356/NiceProcessX64.bmp
https://cdn.discordapp.com/attachments/1004293542186848319/1006848228697841664/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Signatures
-
Processes:
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Executes dropped EXE 1 IoCs
Processes:
t1kdOSt1FNK93VYIVQGx60d8.exepid process 480 t1kdOSt1FNK93VYIVQGx60d8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Control Panel\International\Geo\Nation c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe -
Loads dropped DLL 1 IoCs
Processes:
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exepid process 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ipinfo.io 15 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1532 1824 WerFault.exe c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exet1kdOSt1FNK93VYIVQGx60d8.exepid process 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe 480 t1kdOSt1FNK93VYIVQGx60d8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exedescription pid process target process PID 1824 wrote to memory of 480 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe t1kdOSt1FNK93VYIVQGx60d8.exe PID 1824 wrote to memory of 480 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe t1kdOSt1FNK93VYIVQGx60d8.exe PID 1824 wrote to memory of 480 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe t1kdOSt1FNK93VYIVQGx60d8.exe PID 1824 wrote to memory of 480 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe t1kdOSt1FNK93VYIVQGx60d8.exe PID 1824 wrote to memory of 1532 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe WerFault.exe PID 1824 wrote to memory of 1532 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe WerFault.exe PID 1824 wrote to memory of 1532 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe WerFault.exe PID 1824 wrote to memory of 1532 1824 c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe"C:\Users\Admin\AppData\Local\Temp\c6bdc5a590a5c53b534c9dd5d345cfe4b311fca31bf4ea86a48e3e88042e31a4.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\Pictures\Minor Policy\t1kdOSt1FNK93VYIVQGx60d8.exe"C:\Users\Admin\Pictures\Minor Policy\t1kdOSt1FNK93VYIVQGx60d8.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 14202⤵
- Program crash
PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
Filesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f