Analysis

  • max time kernel
    144s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2022 12:55

General

  • Target

    WW14.exe

  • Size

    351KB

  • MD5

    312ad3b67a1f3a75637ea9297df1cedb

  • SHA1

    7d922b102a52241d28f1451d3542db12b0265b75

  • SHA256

    3b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e

  • SHA512

    848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515

  • SSDEEP

    6144:N/qVYZEPD78jA9aNGY9i81SV2K2d6Or989IwfvyvbAxXUt:NeYZ+8d3S5yc

Malware Config

Extracted

Family

privateloader

C2

http://91.241.19.125/pub.php?pub=one

http://sarfoods.com/index.php

Attributes
  • payload_url

    https://cdn.discordapp.com/attachments/1003879548242374749/1003976870611669043/NiceProcessX64.bmp

    https://cdn.discordapp.com/attachments/1003879548242374749/1003976754358124554/NiceProcessX32.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp

    https://c.xyzgamec.com/userdown/2202/random.exe

    http://193.56.146.76/Proxytest.exe

    http://www.yzsyjyjh.com/askhelp23/askinstall23.exe

    http://privacy-tools-for-you-780.com/downloads/toolspab3.exe

    http://luminati-china.xyz/aman/casper2.exe

    https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe

    http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe

    https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp

    http://185.215.113.208/ferrari.exe

    https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp

    https://c.xyzgamec.com/userdown/2202/random.exe

    http://mnbuiy.pw/adsli/note8876.exe

    http://www.yzsyjyjh.com/askhelp23/askinstall23.exe

    http://luminati-china.xyz/aman/casper2.exe

    https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe

    http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe

    https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe

    https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe

    https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe

    https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe

    https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Downloads MZ/PE file
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WW14.exe
    "C:\Users\Admin\AppData\Local\Temp\WW14.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\Pictures\Adobe Films\9RMLiQsFEQWi0S5K22xN0bh7.exe
      "C:\Users\Admin\Pictures\Adobe Films\9RMLiQsFEQWi0S5K22xN0bh7.exe"
      2⤵
        PID:332
      • C:\Users\Admin\Pictures\Adobe Films\lzAySHQPU19mSGEw9zUvCDyq.exe
        "C:\Users\Admin\Pictures\Adobe Films\lzAySHQPU19mSGEw9zUvCDyq.exe"
        2⤵
          PID:1040
        • C:\Users\Admin\Pictures\Adobe Films\06f1nMSQjYNtcm2kxJbu9s0w.exe
          "C:\Users\Admin\Pictures\Adobe Films\06f1nMSQjYNtcm2kxJbu9s0w.exe"
          2⤵
            PID:1312
          • C:\Users\Admin\Pictures\Adobe Films\x6RNmPjbxn5eOJm8KiQ6s_IM.exe
            "C:\Users\Admin\Pictures\Adobe Films\x6RNmPjbxn5eOJm8KiQ6s_IM.exe"
            2⤵
              PID:1556
            • C:\Users\Admin\Pictures\Adobe Films\C2OJ5dEWbPEGsfatU_imcVty.exe
              "C:\Users\Admin\Pictures\Adobe Films\C2OJ5dEWbPEGsfatU_imcVty.exe"
              2⤵
                PID:1672
              • C:\Users\Admin\Pictures\Adobe Films\kIIIwIO_nnMKguTPitNzeTzd.exe
                "C:\Users\Admin\Pictures\Adobe Films\kIIIwIO_nnMKguTPitNzeTzd.exe"
                2⤵
                  PID:296
                • C:\Users\Admin\Pictures\Adobe Films\Rpyi5R7gsiuimKWyHTChW4Tm.exe
                  "C:\Users\Admin\Pictures\Adobe Films\Rpyi5R7gsiuimKWyHTChW4Tm.exe"
                  2⤵
                    PID:1104
                  • C:\Users\Admin\Pictures\Adobe Films\sSgwRiJjlr_6PBrX9jrFeAwD.exe
                    "C:\Users\Admin\Pictures\Adobe Films\sSgwRiJjlr_6PBrX9jrFeAwD.exe"
                    2⤵
                      PID:1732
                    • C:\Users\Admin\Pictures\Adobe Films\7PKeyctskSboByL6BYbK9dey.exe
                      "C:\Users\Admin\Pictures\Adobe Films\7PKeyctskSboByL6BYbK9dey.exe"
                      2⤵
                        PID:1604

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Persistence

                    Modify Existing Service

                    1
                    T1031

                    Defense Evasion

                    Modify Registry

                    2
                    T1112

                    Disabling Security Tools

                    1
                    T1089

                    Install Root Certificate

                    1
                    T1130

                    Credential Access

                    Credentials in Files

                    1
                    T1081

                    Discovery

                    Query Registry

                    1
                    T1012

                    System Information Discovery

                    2
                    T1082

                    Collection

                    Data from Local System

                    1
                    T1005

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\Pictures\Adobe Films\06f1nMSQjYNtcm2kxJbu9s0w.exe
                      Filesize

                      3.8MB

                      MD5

                      77d8df4427c8b1a28c8d2591a9c92a70

                      SHA1

                      9a0e1ca712f93f4ab30b162f5c9b04d9c825f1f9

                      SHA256

                      00cbd7c3427b9d2e960bd1d3fb04d3897a7c53486b52e5c42f0c2c6678a63762

                      SHA512

                      8204c35c4b4aa6a15c4d32d8600d0792e21296af633fc0ab45141abdfd7bcf0fb9b96a972f7734e01ca0ee9002d0e730f6380c5593ed0ca5e534c7c48ed83b98

                    • C:\Users\Admin\Pictures\Adobe Films\9RMLiQsFEQWi0S5K22xN0bh7.exe
                      Filesize

                      4.1MB

                      MD5

                      7e1cfaf5e71b2ffe2e0ea6a17c22d111

                      SHA1

                      ce1b85590d3d86e667ee79f71070f3988679f79e

                      SHA256

                      ef48417a56d2c3f7ee5acf5061d4edb24db3dcd3250801e4fc68580fe287e76a

                      SHA512

                      9acb36d58a52b1e458a4db6b680757d62a59d2c4cdc929d5efb42461242191006842586c3732d1f19e5ec34d35661734f22e0696c6df5cc074dc3d33d50cb439

                    • C:\Users\Admin\Pictures\Adobe Films\lzAySHQPU19mSGEw9zUvCDyq.exe
                      Filesize

                      934KB

                      MD5

                      d57358dc5a8f0319a808e9e4ff7edaf1

                      SHA1

                      331dfc86cb6b588f2f55e9524ed134209234be0a

                      SHA256

                      61942e005f67064ee8c7919dcdd3a4f847f089a2dfe8c77cf7a8ec2d263ff775

                      SHA512

                      fb9b9a71a77178e0821466ef492376e7c67d354a80f2c6ba4b0046cc10580f8b27a1c6bcdbf35aa940b63737850cc7f160f1a0b9227cfaa9aa6f4eed184e5b62

                    • \Users\Admin\Pictures\Adobe Films\06f1nMSQjYNtcm2kxJbu9s0w.exe
                      Filesize

                      3.8MB

                      MD5

                      77d8df4427c8b1a28c8d2591a9c92a70

                      SHA1

                      9a0e1ca712f93f4ab30b162f5c9b04d9c825f1f9

                      SHA256

                      00cbd7c3427b9d2e960bd1d3fb04d3897a7c53486b52e5c42f0c2c6678a63762

                      SHA512

                      8204c35c4b4aa6a15c4d32d8600d0792e21296af633fc0ab45141abdfd7bcf0fb9b96a972f7734e01ca0ee9002d0e730f6380c5593ed0ca5e534c7c48ed83b98

                    • \Users\Admin\Pictures\Adobe Films\7PKeyctskSboByL6BYbK9dey.exe
                      Filesize

                      859KB

                      MD5

                      c385d359140d34dbfd9c8b0fd61630cf

                      SHA1

                      579287991e41cc9be05d928a44dff09069bf4e0d

                      SHA256

                      311f57a006abd7d319bec7dec2b591280a573a039223a48f62ba95da028857a2

                      SHA512

                      d44743feb5d9042df55149889e96816ec8b631af326c81e8546cc68f87e08ff54c38d4f2f81d7815e103c5b7bbd1f511fa2dd13bddb561e2d2e3cd7b3f3e5871

                    • \Users\Admin\Pictures\Adobe Films\9RMLiQsFEQWi0S5K22xN0bh7.exe
                      Filesize

                      4.1MB

                      MD5

                      7e1cfaf5e71b2ffe2e0ea6a17c22d111

                      SHA1

                      ce1b85590d3d86e667ee79f71070f3988679f79e

                      SHA256

                      ef48417a56d2c3f7ee5acf5061d4edb24db3dcd3250801e4fc68580fe287e76a

                      SHA512

                      9acb36d58a52b1e458a4db6b680757d62a59d2c4cdc929d5efb42461242191006842586c3732d1f19e5ec34d35661734f22e0696c6df5cc074dc3d33d50cb439

                    • \Users\Admin\Pictures\Adobe Films\9RMLiQsFEQWi0S5K22xN0bh7.exe
                      Filesize

                      4.1MB

                      MD5

                      7e1cfaf5e71b2ffe2e0ea6a17c22d111

                      SHA1

                      ce1b85590d3d86e667ee79f71070f3988679f79e

                      SHA256

                      ef48417a56d2c3f7ee5acf5061d4edb24db3dcd3250801e4fc68580fe287e76a

                      SHA512

                      9acb36d58a52b1e458a4db6b680757d62a59d2c4cdc929d5efb42461242191006842586c3732d1f19e5ec34d35661734f22e0696c6df5cc074dc3d33d50cb439

                    • \Users\Admin\Pictures\Adobe Films\C2OJ5dEWbPEGsfatU_imcVty.exe
                      Filesize

                      1.8MB

                      MD5

                      4a036a4cf51fdec0b4705904b3702dcc

                      SHA1

                      6bb21ffc0c8e84fc6bc0ef7400d2413572936007

                      SHA256

                      fe1e02caf8ae272e299a3a9f244b4f17e92a89e041b337a7ce12537756bd0229

                      SHA512

                      7980ad6b533f6d18adf8b0562f983e25097db9454012f166de7d94ac0f57da5ecf587086ef7048544f5258628e8cf68da21fb93532a69fafcecd3e2aff8b8778

                    • \Users\Admin\Pictures\Adobe Films\kIIIwIO_nnMKguTPitNzeTzd.exe
                      Filesize

                      1.4MB

                      MD5

                      47d8824241636f9895d127858b55401f

                      SHA1

                      c3ec120e33e0723fbe509dcbf08e1605986b43d6

                      SHA256

                      eda1406b045f2bbcbfa4f46b5995b995afe5ebc81eb17fb04907d29c00eb484f

                      SHA512

                      b023a708cf205739e1873eaca901abed1d76c82e45ad014cc2bb9638c36f1eff6fe6586dc92b36c695b414733e13bb482c5dd5cd719ad6396dfce6141cca3d08

                    • \Users\Admin\Pictures\Adobe Films\lzAySHQPU19mSGEw9zUvCDyq.exe
                      Filesize

                      934KB

                      MD5

                      d57358dc5a8f0319a808e9e4ff7edaf1

                      SHA1

                      331dfc86cb6b588f2f55e9524ed134209234be0a

                      SHA256

                      61942e005f67064ee8c7919dcdd3a4f847f089a2dfe8c77cf7a8ec2d263ff775

                      SHA512

                      fb9b9a71a77178e0821466ef492376e7c67d354a80f2c6ba4b0046cc10580f8b27a1c6bcdbf35aa940b63737850cc7f160f1a0b9227cfaa9aa6f4eed184e5b62

                    • \Users\Admin\Pictures\Adobe Films\x6RNmPjbxn5eOJm8KiQ6s_IM.exe
                      Filesize

                      3.6MB

                      MD5

                      39c88b9d396d6623287a0bc9feb786f5

                      SHA1

                      cb9f72d44a6ecab7be3194a8cb7f71e3216a1229

                      SHA256

                      a006015bb8753bb67526937ab7a8bd38b764e7afdc91010b4bfc4dc3db60fa1a

                      SHA512

                      2fd30204ea5315b9a7312895100f30aa91fc2c57acddf4311537018c598dfd104dda282c170f128f17aef9829565e7e33e877313b8777e0412832aa7b341a503

                    • memory/296-69-0x0000000000000000-mapping.dmp
                    • memory/332-64-0x0000000000000000-mapping.dmp
                    • memory/1016-55-0x00000000038C0000-0x0000000003B14000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/1016-54-0x0000000075F51000-0x0000000075F53000-memory.dmp
                      Filesize

                      8KB

                    • memory/1016-56-0x00000000038C0000-0x0000000003B14000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/1016-57-0x0000000000DA0000-0x0000000000DCE000-memory.dmp
                      Filesize

                      184KB

                    • memory/1040-62-0x0000000000000000-mapping.dmp
                    • memory/1312-59-0x0000000000000000-mapping.dmp