Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 14:53

General

  • Target

    b48ff67b69875754b656d08d009cf0d8e232b824383cb6046a177b94264d5d41.exe

  • Size

    107KB

  • MD5

    80afe1042d98581b0cb58a178cdc55d5

  • SHA1

    401507b9160076653e63203dd76643d40f90a065

  • SHA256

    b48ff67b69875754b656d08d009cf0d8e232b824383cb6046a177b94264d5d41

  • SHA512

    10898ce43344800f9e5dfda91f37f9b2f9c2420fbbac6d0bd684f73bab674529d65afc2a149a3a370dfb5568bfe5306c8ff041e14514a7131d03e648f0ebcace

  • SSDEEP

    3072:fgLe2pj73Lg6JtL7wMTsI0ItmBX/nyCry7u:fqJTsbI0BvnE

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b48ff67b69875754b656d08d009cf0d8e232b824383cb6046a177b94264d5d41.exe
    "C:\Users\Admin\AppData\Local\Temp\b48ff67b69875754b656d08d009cf0d8e232b824383cb6046a177b94264d5d41.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Roaming\glctqOUlPtVf.exe
      "C:\Users\Admin\AppData\Roaming\glctqOUlPtVf.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\glctqOUlPtVf.exe

    Filesize

    4KB

    MD5

    113f9cdd637cec7a916b75d2fe50fdae

    SHA1

    ee6202462f331ffc97536c81cd2b29079f54f162

    SHA256

    a9d1a75124af528ddc98071bf199871b024387845dfad0a84eaaa4b4499dd992

    SHA512

    198d332848c5cbc4a2952534306bdd318adaf6073fc3fb1e509bcca7f1b62d9aa7fce2088286e03702bbab43f3535057350c8fa8aef32636b0b660941b380c72

  • C:\Users\Admin\AppData\Roaming\glctqOUlPtVf.exe

    Filesize

    4KB

    MD5

    113f9cdd637cec7a916b75d2fe50fdae

    SHA1

    ee6202462f331ffc97536c81cd2b29079f54f162

    SHA256

    a9d1a75124af528ddc98071bf199871b024387845dfad0a84eaaa4b4499dd992

    SHA512

    198d332848c5cbc4a2952534306bdd318adaf6073fc3fb1e509bcca7f1b62d9aa7fce2088286e03702bbab43f3535057350c8fa8aef32636b0b660941b380c72

  • memory/1716-136-0x0000000074C60000-0x0000000075211000-memory.dmp

    Filesize

    5.7MB

  • memory/1756-132-0x0000000074C60000-0x0000000075211000-memory.dmp

    Filesize

    5.7MB

  • memory/1756-137-0x0000000074C60000-0x0000000075211000-memory.dmp

    Filesize

    5.7MB