Analysis
-
max time kernel
178s -
max time network
260s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe
Resource
win7-20221111-en
General
-
Target
a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe
-
Size
916KB
-
MD5
7f614be5e9b8234eb45b8cc0bfdb11f4
-
SHA1
d6ac81d675b72a4991130568fcbcb0dc7440f514
-
SHA256
a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc
-
SHA512
870ccf3b24adfa547844a7e9b0cfe4ef6da2f72c5c22e028b2b5ea2ec6a3f0588da33bf35d50eacdd6618f9ade024c8fde5fda90c6e8730aacd1b746b68fe172
-
SSDEEP
24576:50Ytp60S1+JZXTrwzW+93ww0+ei21o3v7J:BC0tXTg/gw0+rv1
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe -
Deletes itself 1 IoCs
pid Process 812 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1744 timeout.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID\ = "Excel.Chart.5" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\TreatAs\ = "{00020821-0000-0000-C000-000000000046}" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AuxUserType\2\ = "Chart" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\DefaultIcon a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\PersistentHandler\ = "{98de59a0-d175-11cd-a7bd-00006b827d94}" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "Microsoft Excel Chart" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AutoConvertTo a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\NotInsertable a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AutoConvertTo\ = "{00020821-0000-0000-C000-000000000046}" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AuxUserType a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\PersistentHandler a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AuxUserType\3\ = "Microsoft Excel" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\DefaultIcon\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE,1" a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Insertable a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\TreatAs a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AuxUserType\2 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AuxUserType\3 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe Token: SeIncBasePriorityPrivilege 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 836 wrote to memory of 812 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe 30 PID 836 wrote to memory of 812 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe 30 PID 836 wrote to memory of 812 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe 30 PID 836 wrote to memory of 812 836 a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe 30 PID 812 wrote to memory of 1744 812 cmd.exe 32 PID 812 wrote to memory of 1744 812 cmd.exe 32 PID 812 wrote to memory of 1744 812 cmd.exe 32 PID 812 wrote to memory of 1744 812 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe"C:\Users\Admin\AppData\Local\Temp\a4612a2059d51283826f6a932e5e58f467fb04612e535da3421e71ecdb4a6bbc.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\A4612A~1.EXE2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:1744
-
-