Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 00:09

General

  • Target

    334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe

  • Size

    392KB

  • MD5

    e93590ec419d167842a3c0c8532fa56e

  • SHA1

    fbbd693044fa478a7e76def68c158bc5ba2b9054

  • SHA256

    334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a

  • SHA512

    ef9b10430e3093d64519091b9375d9d04af19a7d7361157cd484d315b3c75a4bf99a27f4ac2e2c8d0140e0ce0437a6b33556b52cce6b83bc132494142cb7a7f8

  • SSDEEP

    6144:k9nZEPD78jA9aNGY9i81SV2K2d6Or989IwfvyvbAxXUtx/qVj:4Z+8d3S5ycUej

Malware Config

Extracted

Family

privateloader

C2

http://163.123.143.4/proxies.txt

http://107.182.129.251/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

163.123.143.12

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe
    "C:\Users\Admin\AppData\Local\Temp\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Users\Admin\AppData\Local\Temp\3582-490\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe"
      2⤵
      • Executes dropped EXE
      PID:1368

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe
    Filesize

    351KB

    MD5

    312ad3b67a1f3a75637ea9297df1cedb

    SHA1

    7d922b102a52241d28f1451d3542db12b0265b75

    SHA256

    3b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e

    SHA512

    848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515

  • C:\Users\Admin\AppData\Local\Temp\3582-490\334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a.exe
    Filesize

    351KB

    MD5

    312ad3b67a1f3a75637ea9297df1cedb

    SHA1

    7d922b102a52241d28f1451d3542db12b0265b75

    SHA256

    3b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e

    SHA512

    848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515

  • memory/1368-132-0x0000000000000000-mapping.dmp