Analysis
-
max time kernel
59s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe
Resource
win10v2004-20220812-en
General
-
Target
b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe
-
Size
11.1MB
-
MD5
bb75006881acf08328e61ee174853fa5
-
SHA1
b93e32bd55354bc67be5b50a364c67e760fca62b
-
SHA256
b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a
-
SHA512
78feb1e62e5394ccd57eb834643c9d23e85e857c8077e5262f7b0d37555cb8275b8b0ae903659e99224ce4c06d705a69a4388ff9fc49a63a1bc1a2a1735f1a89
-
SSDEEP
196608:9Vg6dKfSwWpQn1c+uGIJm2iNq+/t+D/BHlAqr+9U2jsINu3lRDGFQVqTzJyLFDfp:9Vg64fSsOXm2mzw/5lt+9aIN4KF5KFjp
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.akamai.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 848 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 848 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe 848 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 848 vlc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1164 wrote to memory of 1620 1164 b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe 27 PID 1620 wrote to memory of 848 1620 rundll32.exe 29 PID 1620 wrote to memory of 848 1620 rundll32.exe 29 PID 1620 wrote to memory of 848 1620 rundll32.exe 29 PID 1620 wrote to memory of 848 1620 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe"C:\Users\Admin\AppData\Local\Temp\b3fe78dad4be7e49a19ab77c4e01c59381dbf5b1a0c37c7e117916038323d51a.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\stripdurak_)-spaces.ru.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\stripdurak_)-spaces.ru.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:848
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.0MB
MD51b04344861d067b461c714c642bb370c
SHA115d142b802606cb877761769c4604e23c36f2d46
SHA256ae18f157dd6ba4b7fe9463ca5df35f21caa72bf7f925b10fb89e8117f99b788a
SHA5126271b70aff8439f5fb7a4fab2f27c6bc646865d7473f3940bbb84e89ca5eebf0b4de01ae55ac993882c16226a18a4b4c3cfd3a0a1c341dfba317c03b17c15fbc