Analysis
-
max time kernel
129s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
25-11-2022 18:35
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10-20220901-en
General
-
Target
Install.exe
-
Size
5.5MB
-
MD5
a6d27af9e1aeda65750320d3a7709857
-
SHA1
f4f932ba69654deca7180f3a158aef8bf505e74d
-
SHA256
0abe63273a67846206f8c9afa293e88f47e9fc033b56d0deea38670df1f86b21
-
SHA512
478ef047a00f510fed99886806ba1a473c4e426d40ccb947163bce43f8da6ab988d22050529da2801c2c1536dbef0de18e3276d8c44dcb5c08b269ca4fdb9556
-
SSDEEP
98304:ZHuFaBakaCMccv1BylO/G+WZSSIjteq7+LiTMwR4MlQlO8sip+94C7QWRqYPcfYX:ZcaBtgnvPylO/G30hteq7tT5Rzl+C6+4
Malware Config
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Processes:
resource yara_rule behavioral1/memory/2744-151-0x0000000000160000-0x0000000000BFE000-memory.dmp vmprotect behavioral1/memory/2744-225-0x0000000000160000-0x0000000000BFE000-memory.dmp vmprotect behavioral1/memory/2744-226-0x0000000000160000-0x0000000000BFE000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\International\Geo\Nation Install.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
Install.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy Install.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Install.exepid process 2744 Install.exe 2744 Install.exe 2744 Install.exe 2744 Install.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3016
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3732