Analysis
-
max time kernel
80s -
max time network
265s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:38
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20221111-en
General
-
Target
Install.exe
-
Size
710.5MB
-
MD5
79a717543f03279d49beba51cfd7ce0f
-
SHA1
4390f181497c5476f7dd772c4d71d0d286eb1427
-
SHA256
07ba645d0117cf1a9c37615f9ed01b809cbaf417f722c09e71c1c3098e96e0ad
-
SHA512
672758289fb2d3fe5783d76bebe61d761f70215f89a58da07ebf480ee91f7c67b8c009db15774d2fdd355f5f748c9c925146308ca0f7007677170e9e4a60c41d
-
SSDEEP
196608:c9y03YSL7TZ3B8QjPTg5QeNlR2JEECtHGV:WYS/tXjPk5JNX2Ac
Malware Config
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\International\Geo\Nation Install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ipinfo.io 7 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
Install.exedescription ioc process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe File opened for modification C:\Windows\System32\GroupPolicy Install.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Install.exepid process 1056 Install.exe