Analysis
-
max time kernel
96s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe
Resource
win10v2004-20221111-en
General
-
Target
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe
-
Size
722KB
-
MD5
8e910184cbe93a98e107ef6eb7809004
-
SHA1
ce5525f237cf0d9a01ced51874ccbf83ca9321bf
-
SHA256
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb
-
SHA512
08abac662dbafcf129f19723fd557ba0fd2d02753726c65e350e7080c2ae84be9fe8f7e42e22b8866021ac651c127070086c148dc69037da003b7cdbc4c7d040
-
SSDEEP
12288:t81Ed0hYcVhenSZ/8H45yo96jxrE05xdm/KFtUmuX/BoAUEaZuT5On:t81EdVcVYSZncJZEqqEUZPBoAUEKuT52
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
fbupdate.exepid process 956 fbupdate.exe -
Loads dropped DLL 2 IoCs
Processes:
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exefbupdate.exepid process 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe 956 fbupdate.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fbupdate.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fbupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Execution Control Services = "C:\\Program Files (x86)\\Windows Service\\csrss32.exe" fbupdate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
fbupdate.exepid process 956 fbupdate.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fbupdate.exedescription ioc process File created C:\Program Files (x86)\Windows Service\srvctrlver.dat fbupdate.exe File created C:\Program Files (x86)\Windows Service\wlcomm32.ini fbupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
fbupdate.exepid process 956 fbupdate.exe 956 fbupdate.exe 956 fbupdate.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exedescription pid process target process PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe PID 2036 wrote to memory of 956 2036 182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe fbupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe"C:\Users\Admin\AppData\Local\Temp\182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD535f1cf871c50e1a13c5430c926b94148
SHA190df8df3dcfc20d1e549bbe50f9627e51c801070
SHA256a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171
SHA512e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19
-
Filesize
327KB
MD535f1cf871c50e1a13c5430c926b94148
SHA190df8df3dcfc20d1e549bbe50f9627e51c801070
SHA256a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171
SHA512e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19
-
Filesize
586KB
MD52c7b219cd45e962c49b1834083c75183
SHA1053bbbfa1250baadd702ca3a9823552e1ed13d4d
SHA256d1cbb5835a4b94417501f59f179a235a02f1d64ed780fa51b5d6a39a5f565c59
SHA512132b518289358124329b3523ce561dfc23a2445d8360835f65303e11d774341b6996a29bff8d649806a1ae579c071761bc6fb19a70c677ff68085bd6be81dcf1
-
Filesize
327KB
MD535f1cf871c50e1a13c5430c926b94148
SHA190df8df3dcfc20d1e549bbe50f9627e51c801070
SHA256a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171
SHA512e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19
-
Filesize
586KB
MD52c7b219cd45e962c49b1834083c75183
SHA1053bbbfa1250baadd702ca3a9823552e1ed13d4d
SHA256d1cbb5835a4b94417501f59f179a235a02f1d64ed780fa51b5d6a39a5f565c59
SHA512132b518289358124329b3523ce561dfc23a2445d8360835f65303e11d774341b6996a29bff8d649806a1ae579c071761bc6fb19a70c677ff68085bd6be81dcf1