Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe
Resource
win10-20220901-en
General
-
Target
da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe
-
Size
64KB
-
MD5
3f6cd0ff8f90ba35fe22b94e55655c96
-
SHA1
eabdde0d8d5ff3dee1690e322184d7ec2f3f5d10
-
SHA256
da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8
-
SHA512
8d51772b8ffce6b9aef3f1068f067811ae65ce00aca058bbef1e1a847efdb90552fc9c9bd31de0b23da03982e4eb13689caee5fb08ecdff02e3b306ca539322a
-
SSDEEP
1536:gwdyfgYBUngABZvxZ/DOG8s8MkeNSzXzKN:gwdyRapBZP/Dl8DMDSzX+N
Malware Config
Extracted
bitrat
1.38
37.139.128.233:3569
-
communication_password
ce952068942604a6d6df06ed5002fad6
-
tor_process
tor
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001abdd-488.dat acprotect behavioral1/files/0x000700000001abdd-489.dat acprotect -
resource yara_rule behavioral1/memory/2408-428-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral1/memory/2408-524-0x0000000000400000-0x00000000008DC000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4708 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bgroyh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oklsztakdy\\Bgroyh.exe\"" da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 644 set thread context of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 2780 set thread context of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2408 set thread context of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1168 powershell.exe 1168 powershell.exe 1168 powershell.exe 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 4708 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 4708 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeShutdownPrivilege 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe Token: SeDebugPrivilege 4708 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 644 wrote to memory of 1168 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 66 PID 644 wrote to memory of 1168 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 66 PID 644 wrote to memory of 1168 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 66 PID 644 wrote to memory of 3548 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 68 PID 644 wrote to memory of 3548 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 68 PID 644 wrote to memory of 3548 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 68 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 644 wrote to memory of 2780 644 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 69 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2780 wrote to memory of 2408 2780 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 70 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71 PID 2408 wrote to memory of 4708 2408 da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe"C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA5AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exeC:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe2⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exeC:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe-a "C:\Users\Admin\AppData\Local\707c9a17\plg\BXq0RPj8.json"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\da8f7c39a3136c6546c6f2e36872be49ddd7a8dd53002e12d04739680e4821b8.exe-a "C:\Users\Admin\AppData\Local\Temp\unk.xml"4⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577e6621fd939338d3f19f3dd948ecf43
SHA153df8b3a76c5d6c35a99aa7759ff3bd7ec46588c
SHA2569cb90c1d5c31396519b1f6c73899c062b6ccbd9a8cfc7c0bb054fe88c7825867
SHA5126e812be4c3b958f0497f91e0eb2e8b77d4a13e2b7af750a30ec9bff3dde09a233b5510ee6333a9ab3182c11ab6c3d38789921d517449c6a03164e216cee43c4f
-
Filesize
104B
MD54f3bde9212e17ef18226866d6ac739b6
SHA1732733bec8314beb81437e60876ffa75e72ae6cd
SHA256212173a405c78d70f90e8ec0699a60ed2f4a9f3a8070de62eabd666c268fb174
SHA51210b7cdae0b9a7b0f8e1bfc66a60675fa9b25c523864d5ae3da243f4e6e4c5194f3bd92af57ac956157442f66414bdd3393d0a1e5ba4ef0f192561e8524d4e744
-
Filesize
104B
MD5bf5da170f7c9a8eae88d1cb1a191ff80
SHA1dd1b991a1b03587a5d1edc94e919a2070e325610
SHA256e5d5110feb21939d82d962981aeaaafc4643b40a9b87cbed800ace82135d57cd
SHA5129e32247d8556fd6efffbf7b6b9c325652d8c4b223b0fa38020879171476a49ab1f64d8897b5d8d92b79c5484fd9d5899be26ca5f664ee1f9c2acb0857084121e
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f
-
Filesize
1KB
MD577e6621fd939338d3f19f3dd948ecf43
SHA153df8b3a76c5d6c35a99aa7759ff3bd7ec46588c
SHA2569cb90c1d5c31396519b1f6c73899c062b6ccbd9a8cfc7c0bb054fe88c7825867
SHA5126e812be4c3b958f0497f91e0eb2e8b77d4a13e2b7af750a30ec9bff3dde09a233b5510ee6333a9ab3182c11ab6c3d38789921d517449c6a03164e216cee43c4f
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f