Analysis
-
max time kernel
81s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe
Resource
win10v2004-20220812-en
General
-
Target
e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe
-
Size
116KB
-
MD5
28c04f5ad3cf06d26bcae27683090657
-
SHA1
ec4b8bf5e37b0bcba18c59e4395e40d424d2ea5e
-
SHA256
e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4
-
SHA512
e5c6b712eb3573e761e8e6a66734d5dc1acbbc9a5ec59c7f6aa16fd40edf9cb90d6c9ad444aafaacbf328ee1fdffda61b5cb3f85f56546751068d0abfaeb159b
-
SSDEEP
3072:zFPqtcdH8Kl4gDBmJLzqjcCB678++Ja2ySKtX9hpj0V:zFytciKl4gDGfqwC+0JYxt/pj0V
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\wuQQwQEOpnI = "{1467A9D9-BECD-0373-F283-060253C9D7BE}" inst317ss.exe -
Executes dropped EXE 3 IoCs
pid Process 1864 inst317ss.exe 960 rsysinit.exe 1772 inst_ff.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\asps.dll inst317ss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4444 1772 WerFault.exe 80 -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1467A9D9-BECD-0373-F283-060253C9D7BE}\InProcServer32\ThreadingModel = "Apartment" inst317ss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1467A9D9-BECD-0373-F283-060253C9D7BE} inst317ss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1467A9D9-BECD-0373-F283-060253C9D7BE}\InProcServer32 inst317ss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1467A9D9-BECD-0373-F283-060253C9D7BE}\InProcServer32\ = "C:\\Windows\\SysWow64\\asps.dll" inst317ss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1864 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 76 PID 2296 wrote to memory of 1864 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 76 PID 2296 wrote to memory of 1864 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 76 PID 1864 wrote to memory of 960 1864 inst317ss.exe 77 PID 1864 wrote to memory of 960 1864 inst317ss.exe 77 PID 1864 wrote to memory of 960 1864 inst317ss.exe 77 PID 1864 wrote to memory of 1164 1864 inst317ss.exe 78 PID 1864 wrote to memory of 1164 1864 inst317ss.exe 78 PID 1864 wrote to memory of 1164 1864 inst317ss.exe 78 PID 2296 wrote to memory of 1772 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 80 PID 2296 wrote to memory of 1772 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 80 PID 2296 wrote to memory of 1772 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 80 PID 2296 wrote to memory of 412 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 87 PID 2296 wrote to memory of 412 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 87 PID 2296 wrote to memory of 412 2296 e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe"C:\Users\Admin\AppData\Local\Temp\e8fc76296eccd649f0162320477f25d9b795055ec75102aa68c9702712df88e4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\inst317ss.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\inst317ss.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\rsysinit.exeC:\Users\Admin\AppData\Local\Temp\\rsysinit.exe3⤵
- Executes dropped EXE
PID:960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp_240612281.bat "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\inst317ss.exe"3⤵PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\inst_ff.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\inst_ff.exe"2⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 9283⤵
- Program crash
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1772 -ip 17721⤵PID:2416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD59a3b1c50d00435231357a3ef4fc37f81
SHA1050b5af36327a04e601f27e6de9f0f8ac7824ed4
SHA2565cbc2a463b67d23c4d1b1904d77f8332b33494b9ce3846278c95d95410b81bfa
SHA512fc0362c5ea4adec9a222ad9a615ad89cbf4ad47d4846399b69af24e9253da8061a723e9f852987131541346fe682f2a310103a469122e9c56865c77efdf0d6de
-
Filesize
19KB
MD5f0fdba38d90ba89ecb4a1c96bf4b42b7
SHA17b597633a5d03093f3edaa76d72df3f257256ad5
SHA2564a4c5ac3f53136b668d1f1aa50ade5110e25e964a7e1880cf4dfcc2da051c200
SHA512ada7fb9369805491b98cbae173d650efc0f744f891d7bf479f72d5122fcf64ecd87de56375d6248311d97bb1b711d5d0f12632b5e28fdc17e0edd8c8ae63bf47
-
Filesize
19KB
MD5f0fdba38d90ba89ecb4a1c96bf4b42b7
SHA17b597633a5d03093f3edaa76d72df3f257256ad5
SHA2564a4c5ac3f53136b668d1f1aa50ade5110e25e964a7e1880cf4dfcc2da051c200
SHA512ada7fb9369805491b98cbae173d650efc0f744f891d7bf479f72d5122fcf64ecd87de56375d6248311d97bb1b711d5d0f12632b5e28fdc17e0edd8c8ae63bf47
-
Filesize
22KB
MD55157067e9ceea9beb10eb408a6cca779
SHA15810b9e147c98c7f9e4d3de9d423d58e6159342e
SHA256d8eb26aa1c2775b64a8500e14ffaf5915c00fcc6c660a32eba2f269eaba8bfdb
SHA512a9941f6a12b8bb3876c63f1e45951e91371603fd0dcdd555af96bea6c26798e19bfa9d909bdf8d03eadf6c9c9885dcaea5253b961e9705d79acf2cd5283f1f69
-
Filesize
22KB
MD55157067e9ceea9beb10eb408a6cca779
SHA15810b9e147c98c7f9e4d3de9d423d58e6159342e
SHA256d8eb26aa1c2775b64a8500e14ffaf5915c00fcc6c660a32eba2f269eaba8bfdb
SHA512a9941f6a12b8bb3876c63f1e45951e91371603fd0dcdd555af96bea6c26798e19bfa9d909bdf8d03eadf6c9c9885dcaea5253b961e9705d79acf2cd5283f1f69
-
Filesize
1KB
MD541d7bbec3b2bc56a523523397978da6e
SHA15fc74eca666e43133f96b9b0990e88a9e57250bf
SHA25645da0b0b49ebf76bf83bef68449b603d8b8702160892a77014e06a1260fa7239
SHA5125a047f6108d069a27177fdd3d0089c2d4f5bca0c542f2d180db96d740c2951bf8c7b4d156b51a9d5430ec24a939c7cd11e18875e5667a5881f8d303e27ebc64b
-
Filesize
1KB
MD541d7bbec3b2bc56a523523397978da6e
SHA15fc74eca666e43133f96b9b0990e88a9e57250bf
SHA25645da0b0b49ebf76bf83bef68449b603d8b8702160892a77014e06a1260fa7239
SHA5125a047f6108d069a27177fdd3d0089c2d4f5bca0c542f2d180db96d740c2951bf8c7b4d156b51a9d5430ec24a939c7cd11e18875e5667a5881f8d303e27ebc64b
-
Filesize
51B
MD5f04f494168326c65a3f1da7069a5dafc
SHA1ecf8b7aeb4953bcdd9e0818cc30ffada99602035
SHA256d594a84d1cec28d0e9e3833eef9e693873e9acfc0444749d791a66b2717aede1
SHA512e5a54a341eb3029dc8d1393c2e8957881f95f4ba41998ef439dd3a67841ab083f275c3d670780cf69efa90b342321fddf8bb0addc93042f2fc0d66d9b9bbac94