Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe
Resource
win7-20220812-en
General
-
Target
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe
-
Size
821KB
-
MD5
026f391b1d51a4a3704fa5b04e60b71c
-
SHA1
665984e68ec6c14e5c993cc091fed6acff1f657e
-
SHA256
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb
-
SHA512
35363ea7cbd11f391f9f3f3916007fe78d7f49c24159f920cc8fb6ca9928156435fd79b0184ec50c45f2202ce016732d8f33d469faf1a8db18211eb759855dec
-
SSDEEP
24576:Ebcr1kKQVqv+aHz0j2Fof53IP3ZomLurWGsMDSgFiaul:EbcrZQVaLzLoRYPJFyh+glul
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exepid process 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exedescription pid process target process PID 4736 wrote to memory of 1516 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe PID 4736 wrote to memory of 1516 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe PID 4736 wrote to memory of 1516 4736 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe"C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe" >> NUL2⤵PID:1516