Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 05:44
Behavioral task
behavioral1
Sample
e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe
Resource
win7-20220812-en
General
-
Target
e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe
-
Size
21KB
-
MD5
05326bd441313c30b467c51d7447caf4
-
SHA1
27498a4efc268ec03c362f0e8bb4fa308c8c12d6
-
SHA256
e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065
-
SHA512
de8ff64281152b5012b6424a0a96ac6eaa1c7ca7fea6a49f1eaa326ed3c682322be3e1a30ee9fe10ae5ccbdc4cfb9cbc4cf6a65a51da584ad89388d1609564f3
-
SSDEEP
384:Wpr9sOcIp6wRcsSYLvKWLWbstQTid6HJyraXkqdkJ7PNWoVNaNJawcudoD7U5Ov:2mOhplcsHvKWzX6HJmFqda7kounbcuy1
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4752 attrib.exe 4104 attrib.exe -
resource yara_rule behavioral2/memory/4500-132-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4500-137-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\wincs attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4936 4500 e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe 82 PID 4500 wrote to memory of 4936 4500 e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe 82 PID 4500 wrote to memory of 4936 4500 e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe 82 PID 4936 wrote to memory of 4104 4936 cmd.exe 85 PID 4936 wrote to memory of 4104 4936 cmd.exe 85 PID 4936 wrote to memory of 4104 4936 cmd.exe 85 PID 4936 wrote to memory of 4752 4936 cmd.exe 86 PID 4936 wrote to memory of 4752 4936 cmd.exe 86 PID 4936 wrote to memory of 4752 4936 cmd.exe 86 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4752 attrib.exe 4104 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe"C:\Users\Admin\AppData\Local\Temp\e873a3a14271572ef5baf50e831b2973dc946b7168f395e3e48b54c3e7e70065.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CB82.tmp\system.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\wincs +h +s +r3⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4104
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\pass +h +s +r3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dcfda0bc015ba87324e5f3360090c610
SHA190b59e326a1c62b26f57006de8b3f7568d84425d
SHA25656c6ff1030d3364e0481f759b396ef6df203c370e108bbf9b0fb60d2e93e5e4d
SHA512c7bd92be055be4f70a9cd62d49eb250229b30f7c0911918cef63993857a3d9e249a74b78ecd2c722442a6c30638dafc019e8bbd1b99b67ceb1d20c83f416e900