Analysis
-
max time kernel
190s -
max time network
244s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 18:56
Static task
static1
Behavioral task
behavioral1
Sample
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe
Resource
win7-20220901-en
General
-
Target
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe
-
Size
848KB
-
MD5
cbfd582303e7789614a33bc0319b18c5
-
SHA1
358551dfb3258aa681e13954bd9049e6a52a262d
-
SHA256
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47
-
SHA512
e678c609646d36fe8a0fda84751dfcfd1cf9c1b8dac1b4f59e076d0ee9368cc71a27a81a3642e2b4ea0bb3565b5cbd7180e22eb2452dbd4898a9d83817bca527
-
SSDEEP
24576:nMLqTK9fORLgS1/VigMFkn1CcRaWAibD:mqTK4yS1ggMFknI5W/f
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Jesusbuezeh
Signatures
-
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/4320-145-0x0000000000000000-mapping.dmp WebBrowserPassView behavioral2/memory/4320-146-0x0000000000400000-0x0000000000459000-memory.dmp WebBrowserPassView -
Nirsoft 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4320-145-0x0000000000000000-mapping.dmp Nirsoft behavioral2/memory/4320-146-0x0000000000400000-0x0000000000459000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
Windows Update.exepid process 1484 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 117 whatismyipaddress.com 119 whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Windows Update.exedescription pid process target process PID 1484 set thread context of 1160 1484 Windows Update.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1284 1160 WerFault.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Windows Update.exepid process 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exeWindows Update.exedescription pid process Token: SeDebugPrivilege 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe Token: SeDebugPrivilege 1484 Windows Update.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exeWindows Update.exepid process 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe 1484 Windows Update.exe 1484 Windows Update.exe 1484 Windows Update.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exeWindows Update.exedescription pid process target process PID 2004 wrote to memory of 1484 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe Windows Update.exe PID 2004 wrote to memory of 1484 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe Windows Update.exe PID 2004 wrote to memory of 1484 2004 163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe Windows Update.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe PID 1484 wrote to memory of 1160 1484 Windows Update.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe"C:\Users\Admin\AppData\Local\Temp\163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 1844⤵
- Program crash
PID:1284
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:4320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1160 -ip 11601⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1160 -ip 11601⤵PID:1036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5bc8c0a4d68f9a238f05d1a5de114778a
SHA195a56cb0bf153d69401df831402abe49e0ebf6ff
SHA256e890d6b4224047a27d25c88496ea0941c54a187a8101cff19243043e493b00dd
SHA51249771b72359e58dcf4d5036aa0d08cc4dec3ffef03fc7ff6caef981db826ff5c1879925ed634e8fd1d74e2ec9b3ae9e8589af3423d5fedf67f081317d655215c
-
Filesize
848KB
MD5cbfd582303e7789614a33bc0319b18c5
SHA1358551dfb3258aa681e13954bd9049e6a52a262d
SHA256163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47
SHA512e678c609646d36fe8a0fda84751dfcfd1cf9c1b8dac1b4f59e076d0ee9368cc71a27a81a3642e2b4ea0bb3565b5cbd7180e22eb2452dbd4898a9d83817bca527
-
Filesize
848KB
MD5cbfd582303e7789614a33bc0319b18c5
SHA1358551dfb3258aa681e13954bd9049e6a52a262d
SHA256163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47
SHA512e678c609646d36fe8a0fda84751dfcfd1cf9c1b8dac1b4f59e076d0ee9368cc71a27a81a3642e2b4ea0bb3565b5cbd7180e22eb2452dbd4898a9d83817bca527