Analysis
-
max time kernel
254s -
max time network
345s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe
Resource
win7-20220812-en
General
-
Target
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe
-
Size
758KB
-
MD5
81a370473c4ff6da18b2f4c4fe7d9bfe
-
SHA1
560cdcb52853d2373e39419d20c314166cb858d4
-
SHA256
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c
-
SHA512
4c62fc999a3bbbb06492b88da8b3b6190041e5e78c9fe7929900b8af587a3b977816a8617d679696011f83721149c3acd6614091f05a243ee6881a39f8b7859c
-
SSDEEP
6144:gxc4a/N7TB+rrUri2YiQdNBq31LAJ2R4zFuHaoTFuHao3FuHao:gxlaF7TcrrUri7tNRJ2R4ztstAt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1.exepid process 3804 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe -
Drops startup file 2 IoCs
Processes:
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exepid process 1484 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe 1484 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exedescription pid process target process PID 1484 wrote to memory of 3804 1484 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe 1.exe PID 1484 wrote to memory of 3804 1484 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe 1.exe PID 1484 wrote to memory of 3804 1484 84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe"C:\Users\Admin\AppData\Local\Temp\84c9fef64882ff6362bbb019edd4db383965eb2bcf75aca832b01b8ef91ba78c.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
PID:3804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD569337cff41a1860439f294a9e340cc7e
SHA1b7fc608f41868943edfe1df01e922287bb311c2c
SHA25625edd3c1a5b10376d679f0072e8ee3805289bad89e38273d721408e43f5a14e5
SHA512db6d6de190299a34beb9a86afa29081352fe8e914998a62a8fac1939d23694972762a2d003a757ef2dba9e039a9c9f516696c93197539316ddc3df3cc43180f0
-
Filesize
620KB
MD569337cff41a1860439f294a9e340cc7e
SHA1b7fc608f41868943edfe1df01e922287bb311c2c
SHA25625edd3c1a5b10376d679f0072e8ee3805289bad89e38273d721408e43f5a14e5
SHA512db6d6de190299a34beb9a86afa29081352fe8e914998a62a8fac1939d23694972762a2d003a757ef2dba9e039a9c9f516696c93197539316ddc3df3cc43180f0