Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
31/10/2022, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
6.8MB
-
MD5
86ddd01fcb8b0f19449603a0f87f7d12
-
SHA1
139a9000fca19d95501f7bc44564ad5c7abfb076
-
SHA256
6ad4ad7af5c190c1900895636dd7389c26aa4def32e9ef071644355683bd153c
-
SHA512
0622e5a8575bc326b7d119d2624403f217f376b92cfdbe1fd6097bf8c984cff681669dc174c7fb4cf9dc92ecd06647b8019d1f7736902ed53688c06af559f971
-
SSDEEP
24576:XQ1YBpjIlIMhAVMzVTj6yynktj8KDRefjX6Zzbn4Bx8kiATYQup+6BdiPOkhOFxt:wt
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1144 powershell.exe 1696 file.exe 1696 file.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1144 powershell.exe Token: SeDebugPrivilege 1696 file.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1144 1696 file.exe 27 PID 1696 wrote to memory of 1144 1696 file.exe 27 PID 1696 wrote to memory of 1144 1696 file.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-