Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe
Resource
win7-20220901-en
General
-
Target
51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe
-
Size
88KB
-
MD5
d3344243a5c6929fc3cf6402ca054eea
-
SHA1
bb96f66544cdd513ee96ae03cd4eae1f7b51218a
-
SHA256
51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb
-
SHA512
2b258c35d057bb7681fa88dc0d853713da6bdb2ff1d47c1cbfe5f7c18ad6e24065ea9814b38fda456b379838ef7322721a33a2c68411f2fc532617de4984379b
-
SSDEEP
1536:psbJO6kyhioBVsevhW0Bj1j9gMpgRxZxJXzXb0+PMpgRxZxJXzXb0+PgX:2bJO9yhioB6ep9XSRxZxJXzXb0+PMSRu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 216 credentials.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4288 4100 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe 83 PID 4100 wrote to memory of 4288 4100 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe 83 PID 4100 wrote to memory of 4288 4100 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe 83 PID 4288 wrote to memory of 4432 4288 csc.exe 85 PID 4288 wrote to memory of 4432 4288 csc.exe 85 PID 4288 wrote to memory of 4432 4288 csc.exe 85 PID 4100 wrote to memory of 216 4100 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe 86 PID 4100 wrote to memory of 216 4100 51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe"C:\Users\Admin\AppData\Local\Temp\51247a58f41ba112ce31ed44b0a68bc4db8f39763250071fe35957d1e3eaf9cb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @".\bfn3bfuk.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES25C8.tmp" "c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CSCBAFBF44336144B9B5885060886B17D.TMP"3⤵PID:4432
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\credentials.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\credentials.exe"2⤵
- Executes dropped EXE
PID:216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD541e71563ecdbae413c00713e5a5d61aa
SHA10e298401dcc464d3c1b01b79f43d0a6b456f0aa5
SHA25662e9b615cea6e5779fca4046c3285d7080626b3d2572d8db47e214d300df6379
SHA512b3789c005e6c2677993839512ce99532bddcbd62a42d353593922170aa66abae2fa368c07103da1c74374628a9d834d8414755c5b387027d7cdb1c5cb7d01637
-
Filesize
31KB
MD5fc5c20bfc281594184bbc349f30e4e4a
SHA1bf1f54f2a0d8b799567d60a7e526d169407e9443
SHA256226c52dfaaa7debcd1681d9a79976e0099a335112d53c1deda3aa1f6b3265b4b
SHA5127464827a8752328d33a208a05ce2961115bd88cc09819f7cace47f29ff9e1d18091485445f5123713d3a18ae43dec1e3183bb65c5febefa26662417a25aad68f
-
Filesize
31KB
MD5fc5c20bfc281594184bbc349f30e4e4a
SHA1bf1f54f2a0d8b799567d60a7e526d169407e9443
SHA256226c52dfaaa7debcd1681d9a79976e0099a335112d53c1deda3aa1f6b3265b4b
SHA5127464827a8752328d33a208a05ce2961115bd88cc09819f7cace47f29ff9e1d18091485445f5123713d3a18ae43dec1e3183bb65c5febefa26662417a25aad68f
-
Filesize
47KB
MD525219c37ee3bde87b3d60d8dd8d1ce03
SHA12179630421501bd9c8cb5500bb8a725785a58b70
SHA25655b3e5f31e452de68f2ada9aaea7a7eb0045f0303f260f0361e210b56895ea61
SHA51286171aa79961c26ce244aa126a7475574973cdd5a9ba3893ee0e0474c23bd21f90d777c716a999bebf8a05f441f5f2d5ea25a919406fb96b96649d69e4cb52e8
-
Filesize
52KB
MD5e187c935e54aad97b7fad3532546cc9b
SHA107283057567d160618050b15f20da63e3a3117cc
SHA2560b9a89956a9af8b5a307fd7e0b08972409055022722a1213d246f8bd0a0f4e76
SHA512589c757324576edbe177ae6b94e557aeb77c7808e87aa3db8c63bd040347305024130fabb7ee72b95f7782dd0e0a605962c22cf8007e4a23181d1038637eed37
-
Filesize
319B
MD5a8edfb4e7315239d70e8705f8034560e
SHA14567f5470b688a5ebc8a0995c190fd3028f44ea5
SHA25631bd9828ec47be7524d7dcc100f94fd88b22ff4f0f9da8bb028bf6db5f86c5b7
SHA51276b5b76c20884ba19e307a049291a6afd643c814456f0ab70b0e4184e768e7b9d6556a848433bf07b7218f40af008a1fe9a95e695e1b399a6c915fe40655d96e
-
\??\c:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CSCBAFBF44336144B9B5885060886B17D.TMP
Filesize1KB
MD50373b9d11bb24d0a0bbccb1874f85f23
SHA1012fd21f0cfdfabdda6c77acee6d2e48c0d07436
SHA256a74ac62c89282fdf46276afca79d8c3f32578505d589f8932a89474106c0bbb9
SHA5128975beedbd6237de33e753ae341c05119e599637894b68f02e5e456a86c083c62975e36f1bb2ef8a5d9e459e55f206ab1f8a4c08faf253916f92b512c276be24