Analysis
-
max time kernel
145s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
Resource
win10v2004-20220812-en
General
-
Target
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
-
Size
877KB
-
MD5
851409165412e9e5b284919980a57250
-
SHA1
8787a10738dddac229a862a734fc2f412af90045
-
SHA256
17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a
-
SHA512
daf206266be7038684e769beb8f49ff7041c8c8520c74c08ad858adfb78355b9b4ac6f0d138b6eaa4d61e67807dbdb605cf0b6f3bc94098ee8f47654aa9868d6
-
SSDEEP
12288:h1OgLdaOyuunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotC:h1OYdaOluRx+oz5HVhuzAVoLHXtC
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3132 wB7OT.exe 1856 setup.exe 1356 setup.tmp 4148 consoleguard.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 5056 netsh.exe 4388 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wB7OT.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation consoleguard.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\consoleguard setup.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\consoleguard = "C:\\Program Files (x86)\\consoleguard\\consoleguard.exe" consoleguard.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\consoleguard\consoleguard.exe setup.tmp File created C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp File created C:\Program Files (x86)\consoleguard\is-JT299.tmp setup.tmp File created C:\Program Files (x86)\consoleguard\is-5746Q.tmp setup.tmp File created C:\Program Files (x86)\consoleguard\is-SP54N.tmp setup.tmp File opened for modification C:\Program Files (x86)\consoleguard\unins000.dat setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3720 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 setup.tmp 1356 setup.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3720 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 setup.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3132 2868 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 81 PID 2868 wrote to memory of 3132 2868 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 81 PID 2868 wrote to memory of 3132 2868 17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe 81 PID 3132 wrote to memory of 1856 3132 wB7OT.exe 82 PID 3132 wrote to memory of 1856 3132 wB7OT.exe 82 PID 3132 wrote to memory of 1856 3132 wB7OT.exe 82 PID 1856 wrote to memory of 1356 1856 setup.exe 84 PID 1856 wrote to memory of 1356 1856 setup.exe 84 PID 1856 wrote to memory of 1356 1856 setup.exe 84 PID 1356 wrote to memory of 5056 1356 setup.tmp 85 PID 1356 wrote to memory of 5056 1356 setup.tmp 85 PID 1356 wrote to memory of 5056 1356 setup.tmp 85 PID 1356 wrote to memory of 4388 1356 setup.tmp 87 PID 1356 wrote to memory of 4388 1356 setup.tmp 87 PID 1356 wrote to memory of 4388 1356 setup.tmp 87 PID 1356 wrote to memory of 4148 1356 setup.tmp 89 PID 1356 wrote to memory of 4148 1356 setup.tmp 89 PID 1356 wrote to memory of 4148 1356 setup.tmp 89 PID 4148 wrote to memory of 3720 4148 consoleguard.exe 90 PID 4148 wrote to memory of 3720 4148 consoleguard.exe 90 PID 4148 wrote to memory of 3720 4148 consoleguard.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe"C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\7zSCE13.tmp\wB7OT.exe.\wB7OT.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\7zSCE13.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zSCE13.tmp\setup.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\is-59NRG.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-59NRG.tmp\setup.tmp" /SL5="$2018A,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zSCE13.tmp\setup.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:5056
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL5⤵
- Modifies Windows Firewall
PID:4388
-
-
C:\Program Files (x86)\consoleguard\consoleguard.exe"C:\Program Files (x86)\consoleguard\consoleguard.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
319KB
MD5b2e3f929a5cb350908fd06f086e90bff
SHA19aa17bff2283d468fd6fb2a750ba69dee8359fda
SHA256dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600
SHA51253952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9
-
Filesize
2KB
MD506f1f80a222f90c9ca4db4f0fd80042e
SHA1fcb06874371a192043adc4592f16726837883711
SHA2563b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2
SHA512fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec
-
Filesize
2KB
MD506f1f80a222f90c9ca4db4f0fd80042e
SHA1fcb06874371a192043adc4592f16726837883711
SHA2563b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2
SHA512fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
617KB
MD599e68acb7166064eea3a4ca1ce75fe9e
SHA11b62597bba2f21e7000cb5064531f2e193f51e2b
SHA2560f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6
SHA512c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
736KB
MD5438ba275da9f74a5674206741cc9e412
SHA1687845e36c0b914b8acda5229b88ce882fcae2db
SHA256eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384
SHA51256d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964
-
Filesize
1.1MB
MD5e4a2856522e6a817e3f0edd2677fa647
SHA17cffea7ad238e4d2a64238139ab64802dbaf1185
SHA256e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e
SHA51225df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964