Resubmissions

06-11-2022 17:42

221106-v96srafhfk 10

06-11-2022 16:58

221106-vhaagaccd7 10

15-10-2022 04:47

221015-fenalafcam 10

Analysis

  • max time kernel
    300s
  • max time network
    225s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-10-2022 04:47

General

  • Target

    2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe

  • Size

    9.1MB

  • MD5

    58ec0acfe4edcc15917b97ef91596f07

  • SHA1

    60e610685d9a549926e7a9b0cb6bcc6509708d3c

  • SHA256

    2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

  • SHA512

    5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

  • SSDEEP

    196608:K2ejh9Qo2P3Cgnpmtw69DvGSfkDpVpyPc9izcM/WaQCf:Kd4CHx3IyP4izp+Uf

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 17 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
    "C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
      "C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe"
      2⤵
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
        "C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4848
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
        "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:388
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
        "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
        2⤵
        • Executes dropped EXE
        PID:4280
      • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
        "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
        2⤵
        • Executes dropped EXE
        PID:4268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MoUSO.exe.log

      Filesize

      1KB

      MD5

      c75cc9cc7a00ebd9ba76dedbee11f56c

      SHA1

      8ed69043eab6ba6f922d7e238c61c7a35f622f44

      SHA256

      b173312e2500a61342c3a332931e013b20234529208f47beb053cd1f4f702b95

      SHA512

      739070710643bbbefd7f5cbd1b66f1e2d7591d2ea3523b0827a6dca3d874e8aad571e76df1b8d218c5584b107d863f64b762649e28272071f8fa9e0ddaf125a7

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • memory/388-447-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/388-446-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/388-448-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/1080-445-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/1080-362-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/1080-361-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/1080-337-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-173-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-181-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-137-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-138-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-139-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-140-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-141-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-142-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-143-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-144-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-145-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-146-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-147-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-148-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-149-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-150-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-151-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-152-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-154-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-155-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-156-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-157-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-158-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-159-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-160-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-161-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-162-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-163-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-164-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-165-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-166-0x0000000006170000-0x000000000620C000-memory.dmp

      Filesize

      624KB

    • memory/4152-167-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-168-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-169-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-170-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-171-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-172-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-120-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-174-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-175-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-176-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-177-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-178-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-179-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-180-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-136-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-182-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-183-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-184-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-185-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-186-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-187-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-188-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-189-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-204-0x0000000006C50000-0x0000000006C80000-memory.dmp

      Filesize

      192KB

    • memory/4152-205-0x0000000006D20000-0x0000000006DB2000-memory.dmp

      Filesize

      584KB

    • memory/4152-206-0x00000000072C0000-0x00000000077BE000-memory.dmp

      Filesize

      5.0MB

    • memory/4152-209-0x0000000006F90000-0x0000000006F9A000-memory.dmp

      Filesize

      40KB

    • memory/4152-213-0x00000000092B0000-0x00000000092C8000-memory.dmp

      Filesize

      96KB

    • memory/4152-216-0x0000000009790000-0x00000000097AA000-memory.dmp

      Filesize

      104KB

    • memory/4152-217-0x00000000097B0000-0x00000000097B6000-memory.dmp

      Filesize

      24KB

    • memory/4152-121-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-122-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-234-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4152-123-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-124-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-125-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-126-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-135-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-134-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-133-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-132-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-131-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-130-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-129-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-128-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4152-127-0x0000000077DE0000-0x0000000077F6E000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-218-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4256-266-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4256-298-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4256-254-0x0000000000D70000-0x000000000168E000-memory.dmp

      Filesize

      9.1MB

    • memory/4268-581-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4268-566-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/4280-541-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/5040-480-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/5040-494-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/5040-580-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB

    • memory/5040-493-0x00000000009E0000-0x00000000012FE000-memory.dmp

      Filesize

      9.1MB