Analysis
-
max time kernel
66s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/12/2022, 15:58
Behavioral task
behavioral1
Sample
c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe
Resource
win10v2004-20220812-en
General
-
Target
c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe
-
Size
563KB
-
MD5
fb8898216510c6af50a7aa81e23c35cb
-
SHA1
41d42f120ba66bc69efb3a2e1af47e197242f3a2
-
SHA256
c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e
-
SHA512
bd91d17213daa08918998e1352893cf94e36e1c2d7e6008b59c71bbdcbd7b7b58c1c8accc7b561c0e9421c0fe133fa3af131bc2f9ccbc411c38a7c4680851402
-
SSDEEP
12288:jXLRoysOFO0XmyVNpCwSnDTWm2kqvqSfyqMFIoiBrRR0GPJT1QxC:jXLRhFC8m2v5GIoiVRRnuxC
Malware Config
Extracted
C:\Users\Admin\Desktop\!_INFO.txt
Signatures
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\NewInstall.crw => C:\Users\Admin\Pictures\NewInstall.crw.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Users\Admin\Pictures\NewInstall.crw.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe -
resource yara_rule behavioral1/memory/1060-55-0x00000000000E0000-0x0000000000277000-memory.dmp upx behavioral1/memory/1060-56-0x00000000000E0000-0x0000000000277000-memory.dmp upx behavioral1/memory/1060-59-0x00000000000E0000-0x0000000000277000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1116 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\74c5cfb018507a06e9f3970aa4272a93c8517826016cd635354fe8d7109f7d5b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe\" b169ebacc1fdf8cb1c9ed4d8f083b48dc29218ea8c94090465563c3d36c3600f" c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\74c5cfb018507a06e9f3970aa4272a93c8517826016cd635354fe8d7109f7d5b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe\" b169ebacc1fdf8cb1c9ed4d8f083b48dc29218ea8c94090465563c3d36c3600f" c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199469.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\StarterApplicationDescriptors.xml.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\!_INFO.txt c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145373.JPG.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00656_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENGIDX.DAT.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_K_COL.HXK.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLPERF.INI.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\BUZZ.WAV.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\!_INFO.txt c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Monrovia.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00276_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105376.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR29F.GIF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CUP.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\OFFLINE.ICO.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Funafuti.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\bckgzm.exe.mui.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01140_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215710.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Trek.thmx.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14833_.GIF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.DPV.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfig.zip.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\7-Zip\7zG.exe.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\VideoLAN\VLC\locale\el\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files (x86)\Adobe\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18231_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-io.xml.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\appletrailers.luac.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.ES.XML.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENV98SP.POC.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\!_INFO.txt c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\bckgRes.dll.mui.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_04.MID.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Metro.xml.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL093.XML.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\preloaded_data.pb.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielMergeLetter.Dotx.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Lisbon.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE06049_.WMF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14832_.GIF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\!_INFO.txt c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files\Java\jre7\bin\server\classes.jsa.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\__lock_XXX__ c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02752G.GIF.360 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1944 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1116 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 30 PID 1060 wrote to memory of 1116 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 30 PID 1060 wrote to memory of 1116 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 30 PID 1060 wrote to memory of 1116 1060 c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe 30 PID 1116 wrote to memory of 1944 1116 cmd.exe 32 PID 1116 wrote to memory of 1944 1116 cmd.exe 32 PID 1116 wrote to memory of 1944 1116 cmd.exe 32 PID 1116 wrote to memory of 1944 1116 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe"C:\Users\Admin\AppData\Local\Temp\c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 10 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\c3f3659442a27afa1a9e8cbc18479f9c88e209b0429b30b695085746f1edb39e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 10 -w 30003⤵
- Runs ping.exe
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5e7f0a68f30a3ba4a456788ec2b6f8f6f
SHA1deb9ee85356bdbd685aa7a9131ea0dc47c8fccb6
SHA25697f1d1ccc80a36a946a4dd424eb9928e8ad90eefae08f0ec5372dd6d9514f2ad
SHA5128b6120c1591fbaea899a042f1b15e61fffe9759c4ba9b943ffde65a0f6dd0af1f506d60ee9e88035020e55316b7a620887b42bcc28fbbbbdf31afd0dfff87bd1