Analysis
-
max time kernel
242s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe
Resource
win7-20221111-en
General
-
Target
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe
-
Size
39KB
-
MD5
96f120ca40e931cbc8906c4122ed3d71
-
SHA1
ab67f4ee5c0d29b033d586a9fc47ac12af6be0ca
-
SHA256
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4
-
SHA512
2db6594325e34ecdd4b67cb0668ffd896112883e319466a8e08f996868b6a4d699107d6f2d47eb22c8e351be3172d1a7aeab1ff1dbdc42b32e8c3900db1f0474
-
SSDEEP
768:Wrid+Ro3m7xzydFsDZbcQYwhxzzXdFVplNa7ku5t:9x2NzyzsDZbcQYwhxzrtI7NP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exepid process 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Drops startup file 5 IoCs
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports\NO_PWDS_report_23-11-2022_18-09-59-CA72D4A944BD8AF60F577B469AB3D1C1-LNHH.bin dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports\NO_PWDS_report_23-11-2022_18-09-59-CA72D4A944BD8AF60F577B469AB3D1C1-LNHH.bin dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Loads dropped DLL 1 IoCs
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exepid process 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exepid process 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe 1172 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exedescription pid process target process PID 1320 wrote to memory of 1172 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe PID 1320 wrote to memory of 1172 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe PID 1320 wrote to memory of 1172 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe PID 1320 wrote to memory of 1172 1320 dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe"C:\Users\Admin\AppData\Local\Temp\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe"1⤵
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe
Filesize39KB
MD596f120ca40e931cbc8906c4122ed3d71
SHA1ab67f4ee5c0d29b033d586a9fc47ac12af6be0ca
SHA256dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4
SHA5122db6594325e34ecdd4b67cb0668ffd896112883e319466a8e08f996868b6a4d699107d6f2d47eb22c8e351be3172d1a7aeab1ff1dbdc42b32e8c3900db1f0474
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4.exe
Filesize39KB
MD596f120ca40e931cbc8906c4122ed3d71
SHA1ab67f4ee5c0d29b033d586a9fc47ac12af6be0ca
SHA256dc82636eec473b777b943e739f1599bec1cf097ef6b804d1d398462eda4459a4
SHA5122db6594325e34ecdd4b67cb0668ffd896112883e319466a8e08f996868b6a4d699107d6f2d47eb22c8e351be3172d1a7aeab1ff1dbdc42b32e8c3900db1f0474