Analysis
-
max time kernel
75s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe
Resource
win10v2004-20220812-en
General
-
Target
0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe
-
Size
76KB
-
MD5
0468e071687ca7e8bea498c6e9544b7e
-
SHA1
219d3785555a627b66abe571dcf13d09dd98ffc9
-
SHA256
0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717
-
SHA512
0705faa0554a4dcd5115835510a2cd5011b7f74c74613763a2ce6c20fa106ee64939515aa654378642abc6f758e33961df95f2ad96ea70c23526735e3ec4793b
-
SSDEEP
1536:iAhTyTTFQNC13U4rtnDb4tmJb09AtOyBTc/S6vbhdDeB7Fb:vhT2137DYmJbztNBA/SOfe/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1828 wg.exe 2044 fz.exe -
resource yara_rule behavioral1/files/0x00150000000054ab-56.dat upx behavioral1/files/0x00150000000054ab-60.dat upx behavioral1/memory/1828-63-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1828 wg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1828 wg.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 1828 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 27 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1140 wrote to memory of 2044 1140 0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe 28 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29 PID 1828 wrote to memory of 968 1828 wg.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe"C:\Users\Admin\AppData\Local\Temp\0a7b8acf55838642e78e58e93866f190d943c194299a8a0bc0d9a41bd7bd1717.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\wg.exe"C:\wg.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del "C:\wg.exe"3⤵PID:968
-
-
-
C:\fz.exe"C:\fz.exe"2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD504180d3fd8c0c82001a18214b15f974b
SHA1f71501dd1e184cffac99f89d0608725906fac230
SHA256f6b48da74fa0697689f91b3da41e866831f80fc447ed5a135dff5a88a98ba900
SHA512eacf076f697c1f42a0cabf82e2895a7786614bb07a906bf204fc1b4c7ca4d970414c61cba546cff6db7fddee9c8bf96a9f31593d6d0f241dc9ab9697b4e0aca2
-
Filesize
36KB
MD504180d3fd8c0c82001a18214b15f974b
SHA1f71501dd1e184cffac99f89d0608725906fac230
SHA256f6b48da74fa0697689f91b3da41e866831f80fc447ed5a135dff5a88a98ba900
SHA512eacf076f697c1f42a0cabf82e2895a7786614bb07a906bf204fc1b4c7ca4d970414c61cba546cff6db7fddee9c8bf96a9f31593d6d0f241dc9ab9697b4e0aca2
-
Filesize
27KB
MD5f8f23081bd5b889c437606aef37731dd
SHA17e9aefec1f0a66cd5a64b9a683e3a864f1497e3b
SHA2563eca4380bd9f3e2aa5b7c6a6f2bc3a3c7dd6a54c44f91b3f7afd82839f8f0ab0
SHA5128b3a7acdde25181232f73d9c881aa9389c1ad9036c05c9fb7c1f534ca6bb15f18bc6460563438091ffcfe7769105bea9b990baf8dea956347726187bd14d32b8
-
Filesize
27KB
MD5f8f23081bd5b889c437606aef37731dd
SHA17e9aefec1f0a66cd5a64b9a683e3a864f1497e3b
SHA2563eca4380bd9f3e2aa5b7c6a6f2bc3a3c7dd6a54c44f91b3f7afd82839f8f0ab0
SHA5128b3a7acdde25181232f73d9c881aa9389c1ad9036c05c9fb7c1f534ca6bb15f18bc6460563438091ffcfe7769105bea9b990baf8dea956347726187bd14d32b8