Analysis
-
max time kernel
107s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe
Resource
win10v2004-20221111-en
General
-
Target
11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe
-
Size
2.3MB
-
MD5
060eb923702159f7e6c52e7cc1ccb806
-
SHA1
01dd985cc05a78a34708168a0a3c679b26992177
-
SHA256
11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20
-
SHA512
306f8adea85d0dbe3df9b76c620fbd70dd4e1ba7ec8cacad4c2564f89be8e893c09e995304fca54da43c60da8697106463607d674b3f1d32d2dec1922b7f52f1
-
SSDEEP
49152:PHlfU0WtYPWn0mWZhjzXbJKMXKL1i9kjpPSaodI8WHVakO4mVSb+KuGLU:PN5ktELIBlPSpWROv/Ke
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1820 Decoder.exe -
Loads dropped DLL 1 IoCs
pid Process 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 7 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1068 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1820 Decoder.exe 1820 Decoder.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe Token: SeDebugPrivilege 1820 Decoder.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1820 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 29 PID 2008 wrote to memory of 1820 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 29 PID 2008 wrote to memory of 1820 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 29 PID 2008 wrote to memory of 1820 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 29 PID 2008 wrote to memory of 1804 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 30 PID 2008 wrote to memory of 1804 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 30 PID 2008 wrote to memory of 1804 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 30 PID 2008 wrote to memory of 1804 2008 11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe 30 PID 1804 wrote to memory of 1068 1804 cmd.exe 32 PID 1804 wrote to memory of 1068 1804 cmd.exe 32 PID 1804 wrote to memory of 1068 1804 cmd.exe 32 PID 1804 wrote to memory of 1068 1804 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe"C:\Users\Admin\AppData\Local\Temp\11d284da38a3e8a66b68d6d80dcb6d307f8c8fc263ef460e7860fdad4fc76f20.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426
-
Filesize
28B
MD5217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426