Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 04:28
Static task
static1
Behavioral task
behavioral1
Sample
56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe
Resource
win7-20220812-en
General
-
Target
56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe
-
Size
344KB
-
MD5
765b0536202b40d23c76bcd1c4b71a28
-
SHA1
43b249119dcdf155acdc1ea367364a49d879851f
-
SHA256
56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd
-
SHA512
eaf85e39b2fa0d7c6e7cf7b04ed63377e74b3f1a03e989d05d8d0d4d7e8e233408dcc98afe899ab7676c4f257142acac61ca6f85bdf0fa56f83bdc3bca19caa8
-
SSDEEP
6144:A/T3zd9AVAixibDqwbKhqjX9kjeKHYFqoECLrLnZF7tGUP+BgkTbXD/3/:A/XM4DShe9EcHPLrLZ5AICgkTP3/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3320 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2816 3744 56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe 82 PID 3744 wrote to memory of 2816 3744 56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe 82 PID 3744 wrote to memory of 2816 3744 56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe 82 PID 2816 wrote to memory of 3320 2816 cmd.exe 84 PID 2816 wrote to memory of 3320 2816 cmd.exe 84 PID 2816 wrote to memory of 3320 2816 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe"C:\Users\Admin\AppData\Local\Temp\56450f9bc403ba6c35bc59bb9009e010115fec62cc4dec2f0e731b7b3099c8dd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\56450F~1.EXE2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:3320
-
-