Analysis
-
max time kernel
199s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe
Resource
win10v2004-20221111-en
General
-
Target
a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe
-
Size
7.5MB
-
MD5
642799dc8b9bb37f7698e1091395361f
-
SHA1
f2739353a153f8e7a5f857f527529ae6bca5a20c
-
SHA256
a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44
-
SHA512
4b39f7caebca70526d53a57fbf80765fdbb57e9f9f6084b6d6fcfbcd1639522dd2084424f491c31e6c0023ef2427403679f23143fa3938562a1b1ab0d8ebc872
-
SSDEEP
196608:SsEcYtKe4gFPwwBkArzNsucRv3TG2mHVF+P+bj+6Q9fTtoABFF3Doz2AfEl/P3r9:ycYtKetFPwwBkArzNsucRv3TG2mHVF+F
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1996 240606812.exe 3120 explorer.exe 1268 legit.exe 1572 is-3I1L7.tmp -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 240606812.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "\"C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe\"" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 628 set thread context of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4664 4956 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 4956 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 82 PID 628 wrote to memory of 1996 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 85 PID 628 wrote to memory of 1996 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 85 PID 628 wrote to memory of 1996 628 a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe 85 PID 1996 wrote to memory of 3120 1996 240606812.exe 88 PID 1996 wrote to memory of 3120 1996 240606812.exe 88 PID 1996 wrote to memory of 3120 1996 240606812.exe 88 PID 1996 wrote to memory of 1268 1996 240606812.exe 89 PID 1996 wrote to memory of 1268 1996 240606812.exe 89 PID 1996 wrote to memory of 1268 1996 240606812.exe 89 PID 1268 wrote to memory of 1572 1268 legit.exe 90 PID 1268 wrote to memory of 1572 1268 legit.exe 90 PID 1268 wrote to memory of 1572 1268 legit.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"C:\Users\Admin\AppData\Local\Temp\a036c5add52453dec8792b912b645dee230c8002059d65ecc6b0b16dccab3d44.exe"2⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 4723⤵
- Program crash
PID:4664
-
-
-
C:\Users\Admin\AppData\Roaming\240606812.exe"C:\Users\Admin\AppData\Roaming\240606812.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\legit.exe"C:\Users\Admin\AppData\Local\Temp\legit.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp"C:\Users\Admin\AppData\Local\Temp\is-FAPTA.tmp\is-3I1L7.tmp" /SL4 $A01BE C:\Users\Admin\AppData\Local\Temp\legit.exe 1475270 512004⤵
- Executes dropped EXE
PID:1572
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4956 -ip 49561⤵PID:3608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e2da1cea135d6f225a88e1928c7dc99e
SHA1c7e300d9c46146f9c3fc914c86cdac5cd9d77ff0
SHA2563795e3144370de9b6444c245add375789b941ff161349be8d0f0c63ada93391d
SHA512927d4fe20516779c0c305e25d3d462e0e10cece22945f0031bb59f0831408afb4848f488f88f5d253bd7c610af5d64ea6288f8b3139108d760574088c741b5ae
-
Filesize
3.1MB
MD5e2da1cea135d6f225a88e1928c7dc99e
SHA1c7e300d9c46146f9c3fc914c86cdac5cd9d77ff0
SHA2563795e3144370de9b6444c245add375789b941ff161349be8d0f0c63ada93391d
SHA512927d4fe20516779c0c305e25d3d462e0e10cece22945f0031bb59f0831408afb4848f488f88f5d253bd7c610af5d64ea6288f8b3139108d760574088c741b5ae
-
Filesize
610KB
MD5365e4b9988123eef3955a4fb28a9be93
SHA1f2eacd886960eca81ba4c1e1e82f9e70711c296d
SHA256cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9
SHA51207f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991
-
Filesize
610KB
MD5365e4b9988123eef3955a4fb28a9be93
SHA1f2eacd886960eca81ba4c1e1e82f9e70711c296d
SHA256cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9
SHA51207f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991
-
Filesize
1.6MB
MD5ed57ac2313648d8ac358af586df72ac3
SHA1e46a95842bcf27163576a8d15ac0b5f9c93d7fe5
SHA256b0a546677a45f1061b868e00562e91fc6939da47fdfe7ab2e7a3f202502686f9
SHA51295eedb429f8cf22e0b09604b8a12ad3591aec3e66fe68ce62f2a711970adf2db3e6965ddabd4b239f8d848c42a71c3cf7644bd6ff07991dfec8c8b30167bba97
-
Filesize
1.6MB
MD5ed57ac2313648d8ac358af586df72ac3
SHA1e46a95842bcf27163576a8d15ac0b5f9c93d7fe5
SHA256b0a546677a45f1061b868e00562e91fc6939da47fdfe7ab2e7a3f202502686f9
SHA51295eedb429f8cf22e0b09604b8a12ad3591aec3e66fe68ce62f2a711970adf2db3e6965ddabd4b239f8d848c42a71c3cf7644bd6ff07991dfec8c8b30167bba97
-
Filesize
7.4MB
MD5311dc8d6943b738dda5397ea2b012afe
SHA13b5ec42a632343a69da8247286942539a21f8ac2
SHA256ebcb04517b36e2b5470c97bb859590402e91deb1a9ebe7a42b232793f56d6aa3
SHA5123af9aaa201516c26689b4c216fe4af86e1f671498ea578c98202c7a006d3e34b4934367a93687bb96d4ea37c80e46d0676981735e431f61cd62bc544b307d03a
-
Filesize
7.4MB
MD5311dc8d6943b738dda5397ea2b012afe
SHA13b5ec42a632343a69da8247286942539a21f8ac2
SHA256ebcb04517b36e2b5470c97bb859590402e91deb1a9ebe7a42b232793f56d6aa3
SHA5123af9aaa201516c26689b4c216fe4af86e1f671498ea578c98202c7a006d3e34b4934367a93687bb96d4ea37c80e46d0676981735e431f61cd62bc544b307d03a