Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:57
Static task
static1
Behavioral task
behavioral1
Sample
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe
Resource
win10v2004-20220812-en
General
-
Target
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe
-
Size
60KB
-
MD5
673257d4766ef2e5834b88d7923a872d
-
SHA1
280f49b812be00025fd54ab9181f1fd557bbe1e3
-
SHA256
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d
-
SHA512
8a6cccb23f43f00a9dd79a719c574a6b9b032f7afce3818e8888a14f28e998455964915c0bf0aeeb9009aecc53ca26ea98dfa6ea01634cce229108f838b85105
-
SSDEEP
1536:+RLMkhOabE7bjSuCCdFLUvXybjS9AENePba5:gL2QEeH6JU6bm9pNf
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Nbwvw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\TFM0N = "c:\\V47LLEL7994P7E27\\Nbwvw.exe" Nbwvw.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Nbwvw.exedescription ioc process File opened (read-only) \??\e: Nbwvw.exe File opened (read-only) \??\i: Nbwvw.exe File opened (read-only) \??\j: Nbwvw.exe File opened (read-only) \??\o: Nbwvw.exe File opened (read-only) \??\f: Nbwvw.exe File opened (read-only) \??\n: Nbwvw.exe File opened (read-only) \??\p: Nbwvw.exe File opened (read-only) \??\q: Nbwvw.exe File opened (read-only) \??\s: Nbwvw.exe File opened (read-only) \??\a: Nbwvw.exe File opened (read-only) \??\m: Nbwvw.exe File opened (read-only) \??\r: Nbwvw.exe File opened (read-only) \??\u: Nbwvw.exe File opened (read-only) \??\w: Nbwvw.exe File opened (read-only) \??\y: Nbwvw.exe File opened (read-only) \??\b: Nbwvw.exe File opened (read-only) \??\g: Nbwvw.exe File opened (read-only) \??\h: Nbwvw.exe File opened (read-only) \??\k: Nbwvw.exe File opened (read-only) \??\l: Nbwvw.exe File opened (read-only) \??\t: Nbwvw.exe File opened (read-only) \??\v: Nbwvw.exe File opened (read-only) \??\x: Nbwvw.exe File opened (read-only) \??\z: Nbwvw.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Nbwvw.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 Nbwvw.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Nbwvw.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Nbwvw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Nbwvw.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exeNbwvw.exepid process 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe 1668 Nbwvw.exe 1668 Nbwvw.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exepid process 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exeNbwvw.exedescription pid process Token: SeDebugPrivilege 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe Token: SeDebugPrivilege 1668 Nbwvw.exe Token: SeDebugPrivilege 1668 Nbwvw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exeNbwvw.exepid process 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe 1668 Nbwvw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exedescription pid process target process PID 1752 wrote to memory of 1668 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe Nbwvw.exe PID 1752 wrote to memory of 1668 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe Nbwvw.exe PID 1752 wrote to memory of 1668 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe Nbwvw.exe PID 1752 wrote to memory of 1668 1752 2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe Nbwvw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe"C:\Users\Admin\AppData\Local\Temp\2f3e664a0aee652b81e65d2314945140523667bf88909c0a7f6901740dd92e6d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
\??\c:\V47LLEL7994P7E27\Nbwvw.exec:\V47LLEL7994P7E27\Nbwvw.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1668