Analysis
-
max time kernel
151s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe
-
Size
12KB
-
MD5
6cf48390a34ca29ca93ed9d1233a867b
-
SHA1
91be3e627987d930bb19bd47a23fce1cfa2c7775
-
SHA256
5d96c7e165399a26f874e14e20ab5277914f4fceeda523a2e2c805a9d8047a15
-
SHA512
160dedaa9c589386ff759cfa457da10d442b520e17e091243ed7a33cf9b7eff30fd7b170343082e770465691503e1722564ca8687dd006d8f1285dd1222faf7b
-
SSDEEP
192:X3LbBdjbp21sijBFR1TTgJMRqIcuuufNva:n3B5bpynTTEKRdN
Malware Config
Extracted
bitrat
1.38
37.139.128.233:3569
-
communication_password
ce952068942604a6d6df06ed5002fad6
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jkxkjn = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ngbxl\\Jkxkjn.exe\"" SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exepid process 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exedescription pid process target process PID 1540 set thread context of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 6416 powershell.exe 6416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exepowershell.exeSecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exedescription pid process Token: SeDebugPrivilege 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe Token: SeDebugPrivilege 6416 powershell.exe Token: SeShutdownPrivilege 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exepid process 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe 7292 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exedescription pid process target process PID 1540 wrote to memory of 6416 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe powershell.exe PID 1540 wrote to memory of 6416 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe powershell.exe PID 1540 wrote to memory of 6416 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe powershell.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe PID 1540 wrote to memory of 7292 1540 SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6416 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Heur.IEC.908d4036d15.26473.7906.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:7292