Analysis
-
max time kernel
58s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
Resource
win10v2004-20220812-en
General
-
Target
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
-
Size
877KB
-
MD5
851409165412e9e5b284919980a57250
-
SHA1
8787a10738dddac229a862a734fc2f412af90045
-
SHA256
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a
-
SHA512
daf206266be7038684e769beb8f49ff7041c8c8520c74c08ad858adfb78355b9b4ac6f0d138b6eaa4d61e67807dbdb605cf0b6f3bc94098ee8f47654aa9868d6
-
SSDEEP
12288:h1OgLdaOyuunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotC:h1OYdaOluRx+oz5HVhuzAVoLHXtC
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1756 wB7OT.exe 596 setup.exe 1724 setup.tmp 240 consoleguard.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1828 netsh.exe 1632 netsh.exe -
Loads dropped DLL 9 IoCs
pid Process 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 1756 wB7OT.exe 1756 wB7OT.exe 1756 wB7OT.exe 1756 wB7OT.exe 596 setup.exe 1724 setup.tmp 1724 setup.tmp 1724 setup.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\consoleguard setup.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\consoleguard = "C:\\Program Files (x86)\\consoleguard\\consoleguard.exe" consoleguard.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\consoleguard\is-I5NT3.tmp setup.tmp File created C:\Program Files (x86)\consoleguard\is-RVCG4.tmp setup.tmp File opened for modification C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\consoleguard\consoleguard.exe setup.tmp File created C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp File created C:\Program Files (x86)\consoleguard\is-D34O4.tmp setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 952 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 setup.tmp 1724 setup.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 952 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 setup.tmp -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 2004 wrote to memory of 1756 2004 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 28 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 1756 wrote to memory of 596 1756 wB7OT.exe 29 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 596 wrote to memory of 1724 596 setup.exe 30 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1632 1724 setup.tmp 31 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 1828 1724 setup.tmp 33 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 1724 wrote to memory of 240 1724 setup.tmp 35 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36 PID 240 wrote to memory of 952 240 consoleguard.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe"C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\wB7OT.exe.\wB7OT.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp" /SL5="$1017A,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:1632
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:1828
-
-
C:\Program Files (x86)\consoleguard\consoleguard.exe"C:\Program Files (x86)\consoleguard\consoleguard.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
2KB
MD506f1f80a222f90c9ca4db4f0fd80042e
SHA1fcb06874371a192043adc4592f16726837883711
SHA2563b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2
SHA512fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec
-
Filesize
2KB
MD506f1f80a222f90c9ca4db4f0fd80042e
SHA1fcb06874371a192043adc4592f16726837883711
SHA2563b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2
SHA512fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3