Analysis
-
max time kernel
168s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 07:44
Behavioral task
behavioral1
Sample
a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe
Resource
win7-20220901-en
General
-
Target
a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe
-
Size
853KB
-
MD5
6a8e6b872ccb683aaf31b19bd2151b56
-
SHA1
22fa0fc7b33047041c4947b06af29fffbb3d9e6a
-
SHA256
a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88
-
SHA512
7cd065d465caebfb9c0877e13cce89ac0383ccc2b74f0052737890a5a9fd1eaf33840def251364bd43d72a741a5835960906bcd98ab17dc24847933ed5273e31
-
SSDEEP
6144:0uIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLPHkwix1hKZ5xl4g6:f6Wq4aaE6KwyF5L0Y2D1PqLYx1ha3l4X
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe -
resource yara_rule behavioral2/memory/2316-132-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral2/memory/2316-133-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral2/memory/2316-136-0x0000000000400000-0x00000000005D0000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mixta = "\"C:\\Users\\Admin\\AppData\\Roaming\\a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe\"" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2316-133-0x0000000000400000-0x00000000005D0000-memory.dmp autoit_exe behavioral2/memory/2316-136-0x0000000000400000-0x00000000005D0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1088 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2084 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 81 PID 2316 wrote to memory of 2084 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 81 PID 2316 wrote to memory of 2084 2316 a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe 81 PID 2084 wrote to memory of 1088 2084 cmd.exe 83 PID 2084 wrote to memory of 1088 2084 cmd.exe 83 PID 2084 wrote to memory of 1088 2084 cmd.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe"C:\Users\Admin\AppData\Local\Temp\a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v mixta /t REG_SZ /d """C:\Users\Admin\AppData\Roaming\a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe"""2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v mixta /t REG_SZ /d """C:\Users\Admin\AppData\Roaming\a17646989a98441e7af835c62a148cfd1c3936a5dfc79cdd76f340e1b42b1c88.exe"""3⤵
- Adds Run key to start application
- Modifies registry key
PID:1088
-
-