Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe
Resource
win10v2004-20220812-en
General
-
Target
cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe
-
Size
877KB
-
MD5
4bb7a080bf38ec3e69175d1aaf246c70
-
SHA1
d5bc9f95560f5ec58f0ceac46eb174225d5fa7cc
-
SHA256
cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83
-
SHA512
a9406653e0a9993652fd40864d09d56ac07e957cfd3ac0764e3fc6d764b75cd188a31b4be664080a363ffceb8a8ae21139b7be971e4088dcc3ebdacc7ca32522
-
SSDEEP
12288:h1OgLdaO7uunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotx:h1OYdaOiuRx+oz5HVhuzAVoLHXtx
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1948 JYh1J.exe 1144 setup.exe 1708 setup.tmp 1960 consoleguard.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 812 netsh.exe 1412 netsh.exe -
Loads dropped DLL 9 IoCs
pid Process 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 1948 JYh1J.exe 1948 JYh1J.exe 1948 JYh1J.exe 1948 JYh1J.exe 1144 setup.exe 1708 setup.tmp 1708 setup.tmp 1708 setup.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\consoleguard setup.tmp Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\consoleguard = "C:\\Program Files (x86)\\consoleguard\\consoleguard.exe" consoleguard.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp File created C:\Program Files (x86)\consoleguard\is-9P3AA.tmp setup.tmp File created C:\Program Files (x86)\consoleguard\is-NG7GI.tmp setup.tmp File created C:\Program Files (x86)\consoleguard\is-RBSC0.tmp setup.tmp File opened for modification C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\consoleguard\consoleguard.exe setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 524 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1708 setup.tmp 1708 setup.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 524 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 setup.tmp -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1880 wrote to memory of 1948 1880 cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe 27 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1948 wrote to memory of 1144 1948 JYh1J.exe 28 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1144 wrote to memory of 1708 1144 setup.exe 29 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 812 1708 setup.tmp 30 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1412 1708 setup.tmp 32 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1708 wrote to memory of 1960 1708 setup.tmp 34 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35 PID 1960 wrote to memory of 524 1960 consoleguard.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe"C:\Users\Admin\AppData\Local\Temp\cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\JYh1J.exe.\JYh1J.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp" /SL5="$10172,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:812
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:1412
-
-
C:\Program Files (x86)\consoleguard\consoleguard.exe"C:\Program Files (x86)\consoleguard\consoleguard.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
2KB
MD5516acf6dbd55cce18e3b4962d0f9dc6f
SHA137be9f61adfe4015d65649bfda4a73774ee1c6dc
SHA2568f1794c5be77d4237d0f7c7b114ec113e6d0b9af994ab1beff103b8e4bdab62a
SHA512b1cab8bf9e06a88de363ac882b5e59047dd3b101f117e36a88adaacb6ae51534c8c8f97ff9c4a4de1984599c9cc1c98318de48e0006690a325e6eff82b266242
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
2KB
MD5516acf6dbd55cce18e3b4962d0f9dc6f
SHA137be9f61adfe4015d65649bfda4a73774ee1c6dc
SHA2568f1794c5be77d4237d0f7c7b114ec113e6d0b9af994ab1beff103b8e4bdab62a
SHA512b1cab8bf9e06a88de363ac882b5e59047dd3b101f117e36a88adaacb6ae51534c8c8f97ff9c4a4de1984599c9cc1c98318de48e0006690a325e6eff82b266242
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3