Resubmissions

06-11-2022 17:42

221106-v96srafhfk 10

06-11-2022 16:58

221106-vhaagaccd7 10

15-10-2022 04:47

221015-fenalafcam 10

Analysis

  • max time kernel
    302s
  • max time network
    249s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-11-2022 17:42

General

  • Target

    2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe

  • Size

    9.1MB

  • MD5

    58ec0acfe4edcc15917b97ef91596f07

  • SHA1

    60e610685d9a549926e7a9b0cb6bcc6509708d3c

  • SHA256

    2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

  • SHA512

    5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

  • SSDEEP

    196608:K2ejh9Qo2P3Cgnpmtw69DvGSfkDpVpyPc9izcM/WaQCf:Kd4CHx3IyP4izp+Uf

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
    "C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
      "C:\Users\Admin\AppData\Local\Temp\2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3212
  • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
    C:\Users\Admin\AppData\Local\cache\MoUSO.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
      2⤵
      • Executes dropped EXE
      PID:236
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
      2⤵
      • Executes dropped EXE
      PID:3324
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:224
  • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
    C:\Users\Admin\AppData\Local\cache\MoUSO.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
      "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
      2⤵
        PID:4256

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MoUSO.exe.log

      Filesize

      1KB

      MD5

      c75cc9cc7a00ebd9ba76dedbee11f56c

      SHA1

      8ed69043eab6ba6f922d7e238c61c7a35f622f44

      SHA256

      b173312e2500a61342c3a332931e013b20234529208f47beb053cd1f4f702b95

      SHA512

      739070710643bbbefd7f5cbd1b66f1e2d7591d2ea3523b0827a6dca3d874e8aad571e76df1b8d218c5584b107d863f64b762649e28272071f8fa9e0ddaf125a7

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

      Filesize

      9.1MB

      MD5

      58ec0acfe4edcc15917b97ef91596f07

      SHA1

      60e610685d9a549926e7a9b0cb6bcc6509708d3c

      SHA256

      2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02

      SHA512

      5769c348149efc107d94bd02e6bbb16440c7974533b843cc42fb7c23fb3e2209754ab69ca9f04a0ba4c56c83e5c30983568a1b1d5f9861c1328befdf09e78736

    • memory/224-448-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/224-447-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/224-446-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/236-406-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-166-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-173-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-129-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-130-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-131-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-132-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-133-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-134-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-135-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-136-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-137-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-138-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-139-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-140-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-141-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-142-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-143-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-144-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-145-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-146-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-147-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-148-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-149-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-151-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-152-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-153-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-154-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-155-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-156-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-157-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-158-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-159-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-160-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-161-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-162-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-163-0x0000000005D90000-0x0000000005E2C000-memory.dmp

      Filesize

      624KB

    • memory/2584-164-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-165-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-127-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-167-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-168-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-169-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-170-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-171-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-172-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-128-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-174-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-175-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-176-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-177-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-178-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-179-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-180-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-181-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-182-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-183-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-184-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-185-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-186-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-201-0x0000000006900000-0x0000000006930000-memory.dmp

      Filesize

      192KB

    • memory/2584-202-0x00000000069E0000-0x0000000006A72000-memory.dmp

      Filesize

      584KB

    • memory/2584-203-0x0000000006F80000-0x000000000747E000-memory.dmp

      Filesize

      5.0MB

    • memory/2584-206-0x0000000006BC0000-0x0000000006BCA000-memory.dmp

      Filesize

      40KB

    • memory/2584-210-0x0000000008FA0000-0x0000000008FB8000-memory.dmp

      Filesize

      96KB

    • memory/2584-213-0x0000000009490000-0x00000000094AA000-memory.dmp

      Filesize

      104KB

    • memory/2584-214-0x0000000009340000-0x0000000009346000-memory.dmp

      Filesize

      24KB

    • memory/2584-233-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-117-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-118-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-119-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-120-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/2584-121-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-122-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-126-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-125-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-124-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2584-123-0x0000000077A40000-0x0000000077BCE000-memory.dmp

      Filesize

      1.6MB

    • memory/2644-494-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/2644-456-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/2644-493-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/4912-445-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/4912-358-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/4912-346-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/4912-359-0x0000000000B40000-0x000000000145E000-memory.dmp

      Filesize

      9.1MB

    • memory/4936-244-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/4936-262-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4936-294-0x0000000001250000-0x0000000001B6E000-memory.dmp

      Filesize

      9.1MB

    • memory/4936-295-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB