Analysis
-
max time kernel
112s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
677809.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
677809.exe
Resource
win10v2004-20221111-en
General
-
Target
677809.exe
-
Size
541KB
-
MD5
7416af0e6dbe13b36bdfe2e609b00666
-
SHA1
5958c7eb0d93510ff00241c7257d7026c207c7e8
-
SHA256
25483a164b2ab3cb283f494f2022793b99595bbf3af41b0620dcd3b0d3d612be
-
SHA512
e29221074b0c84d093a6b0e70d9912a5300a7fc2f9c096ecaff07d282dfe85f656c6fb6f1b02e5873be42e23aac6abb7032b159add757bd188c6abd3547ecda1
-
SSDEEP
12288:oY+ojsYcfslV1Px6E4ZNmnh6rzYk9Lbfd5vS9/TRTA:oY9sYcfslV1slZqhRkBbV5voVk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4892 wuprisx.exe 4420 wuprisx.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wuprisx.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wuprisx.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wuprisx.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jrkgu = "C:\\Users\\Admin\\AppData\\Roaming\\ibwd\\vlxqnrgviurly.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\wuprisx.exe\" C:\\Users\\Admin\\AppData\\Local" wuprisx.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\APP = "C:\\Users\\Admin\\AppData\\Roaming\\APP\\APP.exe" wuprisx.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4892 set thread context of 4420 4892 wuprisx.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4892 wuprisx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4420 wuprisx.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4892 4896 677809.exe 82 PID 4896 wrote to memory of 4892 4896 677809.exe 82 PID 4896 wrote to memory of 4892 4896 677809.exe 82 PID 4892 wrote to memory of 4420 4892 wuprisx.exe 83 PID 4892 wrote to memory of 4420 4892 wuprisx.exe 83 PID 4892 wrote to memory of 4420 4892 wuprisx.exe 83 PID 4892 wrote to memory of 4420 4892 wuprisx.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wuprisx.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wuprisx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\677809.exe"C:\Users\Admin\AppData\Local\Temp\677809.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\wuprisx.exe"C:\Users\Admin\AppData\Local\Temp\wuprisx.exe" C:\Users\Admin\AppData\Local\Temp\rmita.a2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\wuprisx.exe"C:\Users\Admin\AppData\Local\Temp\wuprisx.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD57975217ccc0fc90230f5df21a0ecb1e0
SHA17ed3a774d848bd12420c06829cfc6cf91b543943
SHA25622a36e4df1d3478dfdf685fa168b416cca641467d97102ab931b7605e409460c
SHA512781e5b75d05bf0007c1c5dc25261ca341519bba2184732e3448316f6331d1cf48fed3133b4737d2457a29d1cdbdbeb699c57ad6dddbe599247e0e69ad5cadf8c
-
Filesize
8KB
MD55e9651548e39691e6e8a155b480e07bc
SHA1a8f7b5d025f901ca84d545bf63228726150cd41e
SHA256d6e0500ee5a750dc59a1393a2ee5c9e94ed2f1fd848d3dc43f9b45dea4681ff2
SHA512fb46563a29150b12aba26e8a8600b104b9496f70e5edf289ee1f21fc1af91522e595815123463049a5d55c1bece2aeee67037825b7f57058dbfa0c5268ecdf78
-
Filesize
84KB
MD56ca33fa76bc79d261644367b29d4ea36
SHA13160e234ba87605126ec10d597920ab9b61feec5
SHA256d7565d792a50c889ff5dbcc76d754629f789ff5e1b60cb5e0d73cdb72ea3be2c
SHA512c1c2271e0b9885b26f13df14a246fbd70693b0eb8326680afed1fed8afe81d186c179ae31a10d0c5a5b1f853ca00032b86153c8b64b78988fa8b2c236d73d0e0
-
Filesize
84KB
MD56ca33fa76bc79d261644367b29d4ea36
SHA13160e234ba87605126ec10d597920ab9b61feec5
SHA256d7565d792a50c889ff5dbcc76d754629f789ff5e1b60cb5e0d73cdb72ea3be2c
SHA512c1c2271e0b9885b26f13df14a246fbd70693b0eb8326680afed1fed8afe81d186c179ae31a10d0c5a5b1f853ca00032b86153c8b64b78988fa8b2c236d73d0e0
-
Filesize
84KB
MD56ca33fa76bc79d261644367b29d4ea36
SHA13160e234ba87605126ec10d597920ab9b61feec5
SHA256d7565d792a50c889ff5dbcc76d754629f789ff5e1b60cb5e0d73cdb72ea3be2c
SHA512c1c2271e0b9885b26f13df14a246fbd70693b0eb8326680afed1fed8afe81d186c179ae31a10d0c5a5b1f853ca00032b86153c8b64b78988fa8b2c236d73d0e0