Analysis
-
max time kernel
193s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe
Resource
win10v2004-20221111-en
General
-
Target
f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe
-
Size
346KB
-
MD5
eeeda99977b129a5e2d40542564df03e
-
SHA1
d957db740670ec5222955e01de3b6afdfd8e4615
-
SHA256
f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b
-
SHA512
939461ada93524493ae96be29ee483d0180da8e7fce11e9055e85257c6c260603721743985a3bc803825c965fabe35db6cb296844a98ecf08ec54b683ed180c3
-
SSDEEP
6144:iyfgDv5drb/TeVCm/Twf5q0KvNxyo+b6hNe+rgB86CnkUUGwA:TgNxbk3QEvNxyo1tgy6CJ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1496 setup.exe 1320 Wiseman.exe 1580 Iiful.exe -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Loads dropped DLL 7 IoCs
pid Process 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 1496 setup.exe 1496 setup.exe 1496 setup.exe 1320 Wiseman.exe 1320 Wiseman.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run Wiseman.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wiseman = "C:\\nth\\Wiseman.exe" Wiseman.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\TFM0N = "c:\\9TQ4M471TTMDL9V2\\Iiful.exe" Iiful.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: Iiful.exe File opened (read-only) \??\b: Iiful.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Iiful.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Iiful.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Iiful.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 604 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1580 Iiful.exe 1580 Iiful.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1496 setup.exe Token: SeDebugPrivilege 1496 setup.exe Token: SeDebugPrivilege 1496 setup.exe Token: SeDebugPrivilege 1580 Iiful.exe Token: SeDebugPrivilege 1580 Iiful.exe Token: SeDebugPrivilege 1580 Iiful.exe Token: SeDebugPrivilege 1580 Iiful.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1496 setup.exe 1320 Wiseman.exe 1580 Iiful.exe 1320 Wiseman.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1496 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 28 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1320 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 29 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 2040 wrote to memory of 1368 2040 f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe 30 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1368 wrote to memory of 604 1368 cmd.exe 32 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33 PID 1496 wrote to memory of 1580 1496 setup.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe"C:\Users\Admin\AppData\Local\Temp\f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\nth\setup.exe"C:\nth\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\9TQ4M471TTMDL9V2\Iiful.exec:\9TQ4M471TTMDL9V2\Iiful.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
-
C:\nth\Wiseman.exe"C:\nth\Wiseman.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping -n 5 127.0.0.1&&del "C:\Users\Admin\AppData\Local\Temp\f83998fc434ea4af8c6c1ac4d34057d9eb4879f6343e4d2c0bdd59d1a876e44b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.13⤵
- Runs ping.exe
PID:604
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
104KB
MD5e8912106b826233dfecf83d4487a997b
SHA12f0c799f93539c0a91f56a50f2655e7d2c9cc95c
SHA256a27cb95a0a09aad9fe880d33a9e08b02229299e3d67c60c9d344394b918a88f0
SHA512cf3c80ca7048a2c7abbb48588c29fc9c556b23da72387b3db1a387871f4e4d889b2f5426deeb0ee345c77ac6b2ec4e90c12c991dcacfae49f74807d263ac7fcb
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
372KB
MD5e6d6560e5c1c397089296424250b76e7
SHA14bcb5260c97686859d9518af737631c5ee9595a0
SHA256940c30a08792ca54e94c2a1fe7cb3b852919be595d1b2c63e48c1ffb5707fd1e
SHA51242923740204f17900992d9aaae2fb305e8e9d6c12338ef23c1b4b3a481214806a9e60cd417b1e0d6f8d0437bc7eb5c727842f656d866b62238293d9d4bb5e903
-
Filesize
372KB
MD5e6d6560e5c1c397089296424250b76e7
SHA14bcb5260c97686859d9518af737631c5ee9595a0
SHA256940c30a08792ca54e94c2a1fe7cb3b852919be595d1b2c63e48c1ffb5707fd1e
SHA51242923740204f17900992d9aaae2fb305e8e9d6c12338ef23c1b4b3a481214806a9e60cd417b1e0d6f8d0437bc7eb5c727842f656d866b62238293d9d4bb5e903
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
39KB
MD593f2abed8dea90e7849a8bf157abd9c3
SHA1975a77bd562964323dcc7913eaf87b7c45ac9a71
SHA256861f8cda5dbf0ee736e25777095061c14a4c46a4ce36455a44dd8932fce039be
SHA5122d709ecf7b0f5babe47fc9a168dde00bcee3974de3176c12ed6c55ee50e868574bc7a26b47da2d36feb2e7a8b96754c792fe9af3a10a202bc626f53b5844b8a1
-
Filesize
372KB
MD5e6d6560e5c1c397089296424250b76e7
SHA14bcb5260c97686859d9518af737631c5ee9595a0
SHA256940c30a08792ca54e94c2a1fe7cb3b852919be595d1b2c63e48c1ffb5707fd1e
SHA51242923740204f17900992d9aaae2fb305e8e9d6c12338ef23c1b4b3a481214806a9e60cd417b1e0d6f8d0437bc7eb5c727842f656d866b62238293d9d4bb5e903
-
Filesize
372KB
MD5e6d6560e5c1c397089296424250b76e7
SHA14bcb5260c97686859d9518af737631c5ee9595a0
SHA256940c30a08792ca54e94c2a1fe7cb3b852919be595d1b2c63e48c1ffb5707fd1e
SHA51242923740204f17900992d9aaae2fb305e8e9d6c12338ef23c1b4b3a481214806a9e60cd417b1e0d6f8d0437bc7eb5c727842f656d866b62238293d9d4bb5e903
-
Filesize
372KB
MD5e6d6560e5c1c397089296424250b76e7
SHA14bcb5260c97686859d9518af737631c5ee9595a0
SHA256940c30a08792ca54e94c2a1fe7cb3b852919be595d1b2c63e48c1ffb5707fd1e
SHA51242923740204f17900992d9aaae2fb305e8e9d6c12338ef23c1b4b3a481214806a9e60cd417b1e0d6f8d0437bc7eb5c727842f656d866b62238293d9d4bb5e903