Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe
Resource
win10v2004-20220812-en
General
-
Target
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe
-
Size
80KB
-
MD5
dd30fe7b51840df7de308a86517d1330
-
SHA1
c9e13327569cf4f3876617dff07c1ec9577e7023
-
SHA256
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49
-
SHA512
91dea4db833214af9c9510ceeb830705b3edbd7e6aac76c422527c8239042c2fc95e6afa237700369e01ca53377d335856a008d8508cb228b931ac84296d5993
-
SSDEEP
1536:chOJ+ecv1HIxsY+N25tCoMZfQT2kGx+x+1R9LwqrA6zSsHDk:mk+bv1He15tt2+x+1LHusjk
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Oxvnt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TFM0N = "c:\\d33q1ldxt74um7x3\\Oxvnt.exe" Oxvnt.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Oxvnt.exedescription ioc process File opened (read-only) \??\a: Oxvnt.exe File opened (read-only) \??\b: Oxvnt.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Oxvnt.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 Oxvnt.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Oxvnt.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Oxvnt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Oxvnt.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
Oxvnt.exepid process 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe 4596 Oxvnt.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exepid process 1048 fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exeOxvnt.exepid process 1048 fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe 4596 Oxvnt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exedescription pid process target process PID 1048 wrote to memory of 4596 1048 fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe Oxvnt.exe PID 1048 wrote to memory of 4596 1048 fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe Oxvnt.exe PID 1048 wrote to memory of 4596 1048 fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe Oxvnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe"C:\Users\Admin\AppData\Local\Temp\fc95fa8dfe20ab0bad6449e9f31562582cc2d98cdf23f1b41a177da3aed49e49.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\d33q1ldxt74um7x3\Oxvnt.exec:\d33q1ldxt74um7x3\Oxvnt.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596
-