Analysis
-
max time kernel
130s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 15:34
Static task
static1
Behavioral task
behavioral1
Sample
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
Resource
win10v2004-20220812-en
General
-
Target
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
-
Size
1.6MB
-
MD5
7920294040c481e979653aa3b0184df8
-
SHA1
6f8ffd5416fe9d40b7afcab95a382d202e367044
-
SHA256
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49
-
SHA512
f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd
-
SSDEEP
49152:ZUdM+MZVtNmqtmr29Sl67GkmdfTeWFbni92VKk7iDIZE:CdmNvt829K2Kf3eDj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows Update.exeWindows Update.exepid process 4484 Windows Update.exe 116 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 whatismyipaddress.com 32 whatismyipaddress.com -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exeWindows Update.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Windows Update.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Windows Update.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exeWindows Update.exeWindows Update.exedescription pid process target process PID 4032 set thread context of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4484 set thread context of 116 4484 Windows Update.exe Windows Update.exe PID 116 set thread context of 3816 116 Windows Update.exe vbc.exe PID 116 set thread context of 1632 116 Windows Update.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Windows Update.exepid process 116 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exeWindows Update.exeWindows Update.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Token: SeDebugPrivilege 4484 Windows Update.exe Token: SeDebugPrivilege 116 Windows Update.exe Token: SeDebugPrivilege 3816 vbc.exe Token: SeDebugPrivilege 1632 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Update.exepid process 116 Windows Update.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exeWindows Update.exeWindows Update.exedescription pid process target process PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 4032 wrote to memory of 5000 4032 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe PID 5000 wrote to memory of 4484 5000 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Windows Update.exe PID 5000 wrote to memory of 4484 5000 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Windows Update.exe PID 5000 wrote to memory of 4484 5000 9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 4484 wrote to memory of 116 4484 Windows Update.exe Windows Update.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 3816 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe PID 116 wrote to memory of 1632 116 Windows Update.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"5⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe.logFilesize
499B
MD5f9452385c9799fc5037ed6832d44e3e1
SHA18fd716b9abf8291eec08b9b047870acf256b3959
SHA25691facb570314813783ded6a201f8a0e60eb3b6b640e1d6eb06021225aee2bfe9
SHA51201debc67daa807998b400fe91b6c2ede3f786c7172c92b86b04235360b1d0ea9c3d2684daa9386db9a6e3642dbdaa3212618aafed81f578291fb686cdca73202
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Windows Update.exe.logFilesize
679B
MD5520de2d0d30e988ded2c48f515fa4b71
SHA12fd6e2398e04e152690e2f31fe6de6d9e18f6ed2
SHA25609465768898e13ecf608ac041a76125461a4542ab5c6de1eaaa86499ff087733
SHA512dcf6001bad2883f1d094cf085ff92edf301fc898f909c7f6c930e417e5ecc99093611bb41091bc265137378e5b6fb070f3d92a8458b4ffb4494face033b44a6d
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD5fdbbb3a4f34e578bab1246d03496dfe7
SHA176f6e45dbb8497f225769101f5135f3c9bc5d06e
SHA256699ce29e69ee7beda5d425a89e9f62ef81bfd21793f066d1974eadcab1df7bbe
SHA51224dbc8f3e9e420ca54ba8ffdc2987b7f85115cdba14031bbefaae40a2686e29e173f8c39796f19e13e51679e799d1beeb8c8b2e3f163c2a9ba207c235ef8450f
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
327B
MD51265c5140a2f68b05b92aa1a25a2abb6
SHA1627a660e9d2a41c8c4a662ca44fdb68a1356bc82
SHA256694bae0c1ebf6f8eeb8d902b1bfad57ed9a42dea6d3e327a0137a1c9f4f0c6b9
SHA512ad6a1dd57ec84459f28926d07e25f2c4f49dc67ff95b8400e85c3bcb8eccc471dbac5e2b1a2758fb563866ecacc2fae4657dfb85197fb4cd2547eef334b8a216
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
1KB
MD501e7975c708365983265ae40d604beb4
SHA1f1c793c9b7a312d355cd944928ba9272bbeec44e
SHA25695d7aeb5f67dc33d0b62d02b26a5d469436f58f2246fd95189a8b86220bc9a40
SHA5129c67c306fbb0e191ea7af01388c6a99714c353590d99887ddd0b0ceee3f6cd3af2e7b2c8d1d22a5a34dac746e4b2156876d935a658afc9a1d38597fd4922e023
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
1.6MB
MD57920294040c481e979653aa3b0184df8
SHA16f8ffd5416fe9d40b7afcab95a382d202e367044
SHA2569a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49
SHA512f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
1.6MB
MD57920294040c481e979653aa3b0184df8
SHA16f8ffd5416fe9d40b7afcab95a382d202e367044
SHA2569a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49
SHA512f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
1.6MB
MD57920294040c481e979653aa3b0184df8
SHA16f8ffd5416fe9d40b7afcab95a382d202e367044
SHA2569a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49
SHA512f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd
-
memory/116-147-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/116-150-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/116-143-0x0000000000000000-mapping.dmp
-
memory/1632-163-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1632-161-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1632-160-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1632-159-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1632-158-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/1632-157-0x0000000000000000-mapping.dmp
-
memory/3816-152-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3816-156-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3816-151-0x0000000000000000-mapping.dmp
-
memory/3816-153-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3816-154-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/4032-135-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/4032-132-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/4484-148-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/4484-137-0x0000000000000000-mapping.dmp
-
memory/4484-142-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/5000-134-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/5000-141-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/5000-136-0x0000000074CA0000-0x0000000075251000-memory.dmpFilesize
5.7MB
-
memory/5000-133-0x0000000000000000-mapping.dmp