Analysis
-
max time kernel
230s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 16:44
Behavioral task
behavioral1
Sample
4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe
Resource
win7-20220812-en
General
-
Target
4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe
-
Size
10.0MB
-
MD5
d3471e1abea87cb9ab4aea1a89f9b2e9
-
SHA1
67d6dac244049ed8de892d4235976df04c4423ba
-
SHA256
4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4
-
SHA512
9d59f49cd51b7f23641ca5c43ed413617b60e19308195af38cef49d30f0b4d4eb0118de600210968c561e1bda0310b33a397b953e9bf6e0d0112a9bc8366c779
-
SSDEEP
196608:dSbvo4WSRKekmQ/8bOg63iJ1Y87GjQUyMqywWK4R1j5X6:dSUokmQ/8bORSJ1YRVLpwWKiB5
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000400000000072f-144.dat acprotect behavioral2/files/0x000400000000072f-145.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3572 OneCoreUAPCommonProxyStub.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5016 attrib.exe -
resource yara_rule behavioral2/files/0x000400000000072f-144.dat upx behavioral2/files/0x000400000000072f-145.dat upx behavioral2/memory/3836-146-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral2/memory/3836-147-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral2/files/0x000300000001e6c9-153.dat upx behavioral2/files/0x000300000001e6c9-154.dat upx behavioral2/memory/3572-155-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/3572-168-0x0000000000400000-0x000000000047D000-memory.dmp upx -
resource yara_rule behavioral2/memory/1656-132-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/1656-135-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/1656-136-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/1656-138-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/3836-139-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/3836-142-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/3836-143-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/632-148-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/632-151-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/4988-171-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/4988-174-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/4988-175-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/4988-177-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/4988-181-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect behavioral2/memory/3836-182-0x0000000000750000-0x00000000019C6000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
pid Process 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ipapi.co 37 ipapi.co 43 ipapi.co -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1656-132-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/1656-135-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/1656-136-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/1656-138-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/3836-139-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/3836-142-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/3836-143-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/632-148-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/632-151-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/4988-171-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/4988-174-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/4988-175-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/4988-177-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/4988-181-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe behavioral2/memory/3836-182-0x0000000000750000-0x00000000019C6000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ OneCoreUAPCommonProxyStub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2272 3836 WerFault.exe 80 -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\winmgmts:\localhost\ OneCoreUAPCommonProxyStub.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\winmgmts:\localhost\ OneCoreUAPCommonProxyStub.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe 3836 OneCoreUAPCommonProxyStub.exe 632 OneCoreUAPCommonProxyStub.exe 632 OneCoreUAPCommonProxyStub.exe 632 OneCoreUAPCommonProxyStub.exe 632 OneCoreUAPCommonProxyStub.exe 4988 OneCoreUAPCommonProxyStub.exe 4988 OneCoreUAPCommonProxyStub.exe 4988 OneCoreUAPCommonProxyStub.exe 4988 OneCoreUAPCommonProxyStub.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3572 OneCoreUAPCommonProxyStub.module.exe Token: 35 3572 OneCoreUAPCommonProxyStub.module.exe Token: SeSecurityPrivilege 3572 OneCoreUAPCommonProxyStub.module.exe Token: SeSecurityPrivilege 3572 OneCoreUAPCommonProxyStub.module.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3836 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 80 PID 1656 wrote to memory of 3836 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 80 PID 1656 wrote to memory of 3836 1656 4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe 80 PID 3836 wrote to memory of 3572 3836 OneCoreUAPCommonProxyStub.exe 82 PID 3836 wrote to memory of 3572 3836 OneCoreUAPCommonProxyStub.exe 82 PID 3836 wrote to memory of 3572 3836 OneCoreUAPCommonProxyStub.exe 82 PID 3836 wrote to memory of 4988 3836 OneCoreUAPCommonProxyStub.exe 84 PID 3836 wrote to memory of 4988 3836 OneCoreUAPCommonProxyStub.exe 84 PID 3836 wrote to memory of 4988 3836 OneCoreUAPCommonProxyStub.exe 84 PID 3836 wrote to memory of 5016 3836 OneCoreUAPCommonProxyStub.exe 85 PID 3836 wrote to memory of 5016 3836 OneCoreUAPCommonProxyStub.exe 85 PID 3836 wrote to memory of 5016 3836 OneCoreUAPCommonProxyStub.exe 85 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5016 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe"C:\Users\Admin\AppData\Local\Temp\4e63690399558ffb13767bab2f6b694376dcb1677f1fac55e64f871b493b2df4.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exeC:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.module.exeC:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\ENU_801FE972F9CE8F3E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\ABC\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exeC:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exe3⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 24163⤵
- Program crash
PID:2272
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exeC:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exe1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3836 -ip 38361⤵PID:2184
-
C:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exeC:\Users\Admin\AppData\Roaming\amd64_netfx-aspnet\OneCoreUAPCommonProxyStub.exe1⤵PID:4732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD55cc76bc870fda765c9291c91a4e9de04
SHA1ff577b0e7756517405b560c2ae0af6b0b1e32fd3
SHA25610e3a941f1d1f1fd335848641261a1b12705e658a29bfab7a1d73a17420390de
SHA512de5801ddb73559cda13b309734d47156ae5a4b50dae1aea11917835729982d101d1c112b11559e7c74354f25e389454dadd3e36afc4c66357352488f4502207c
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
846KB
MD579f7e2d2c14352f4028423ca9e2fa602
SHA1a08369d16d38f12048bde9913a61b394cf11876a
SHA256c950a91cb26f3a4be965f75e7fce70d27af2cf6719e42c0fee1d752edd0486af
SHA512cbf5a686e566e55ae182a5eb6ca953cb35aff61beecd01d8922c6b5d65bed2baf2f3482ac672d6d282fb00c0162a3f742e3a55649960e58c4aa02ea4333a39c7
-
Filesize
11KB
MD54a8fbd593a733fc669169d614021185b
SHA1166e66575715d4c52bcb471c09bdbc5a9bb2f615
SHA256714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42
SHA5126b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b
-
Filesize
943KB
MD506645fc0d6422684d727f7874bafecf3
SHA1529a0096a3d201966ae5542cbf255ccb5dbf49eb
SHA256014923193be24bf87d086fb79ba9b67c3f9d1241508ac3a0b2f170a4a2316cb4
SHA51261d9c33351cab3c6c81f5379b8937524cfa220c1210dcf30d2000aa667f312affd421c30e0cf28f0729b36a1c066fb03f5eb9ed796942b0110c9736083d22d1d
-
Filesize
11KB
MD5bfbc1a403197ac8cfc95638c2da2cf0e
SHA1634658f4dd9747e87fa540f5ba47e218acfc8af2
SHA256272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6
SHA512b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1
-
Filesize
11KB
MD53b068f508d40eb8258ff0b0592ca1f9c
SHA159ac025c3256e9c6c86165082974fe791ff9833a
SHA25607db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7
SHA512e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32
-
Filesize
1.3MB
MD517b6f318d547dccf0336bf230e9adf1a
SHA1ffb2c156a67408f9679f2c4a700f07fbd2295b31
SHA256ab4e7c1c1e7851c0343ec612fdbe145c62a8f609a214bf29e18cf89d281dfa74
SHA512b806116ae335c0d3d42a8ee2a9974fd3ce8718c45259cbde9660bead2e9a764f25fa6a406266294aff685418e1fe3e553bcc097ca5f26e243933de9b0d353b58
-
Filesize
1.4MB
MD5e89469b5783baeb1e029386a6c6c2f30
SHA17e511379484bd6fa9fb4d6f498029dae3a1917ea
SHA256f3a960a21ec163db85e9cf0dffae38fb491a54780b264dd95b5a4d9359eaecdf
SHA51280476405488e78168a481730a5ed19f92ca3a41d1809a9968f15366ebc9705527ba7a684a1906d73c09aac285345577866a853f9f6d1499d6c99093bd2b91e84
-
Filesize
11KB
MD587cbab2a743fb7e0625cc332c9aac537
SHA150f858caa7f4ac3a93cf141a5d15b4edeb447ee7
SHA25657e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023
SHA5126b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa
-
Filesize
3KB
MD521ab7f9357e6782eed3e261072858b6c
SHA1c7d16db24d3a44e270eb471c0b6b4288f0cb8399
SHA256617f9a6ffca3da29ebe583458ce85c53abefef5d991891d7c82a1c18f5833266
SHA512ae82714180bc06ca76fc37633f84328c2ffef176a70016ec533d4dd5902c61117256a3da505275df700734faa8caae7e29ec5196c05d5d531e16d26b68bca44f
-
Filesize
46KB
MD5915defeb6183868c0b131d637132f2f7
SHA119dd324bd5057caeedaa07729ce24ce045e02e11
SHA25641a407ed323eaf80e8ce5f6260a19b4bd3fce138906e1d9d4ced927051f0bbbf
SHA512d74c69d778ffb411931608a438d9d8ac68b5b44c14f596a980ed1a6a47c427589ebfb573fee9e6696ba07a569f95c9f54565d049fc5a396e4b218e5a5f62278a
-
Filesize
3B
MD5ecaa88f7fa0bf610a5a26cf545dcd3aa
SHA157218c316b6921e2cd61027a2387edc31a2d9471
SHA256f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5
SHA51237c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5
-
Filesize
5.4MB
MD5592bfafe2a9b79e71554cec123de66ef
SHA19b9090f91693ee17f06481d3eeecd454de630bc7
SHA256d74d506ddb5622b0d8546c0e93247eb664dc9e707a5bd47b61239573f94f2dea
SHA51213bf3a5445e326b400404f052bea7e73c89af686f5e8b3887bc4759d372c405d5d37df58dacff692cc1dd2aeef3d63b8276d5c9fbb5e4a0b4ba6140bd88500e7
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
115B
MD57843de85c848143d59a053d4791bfd19
SHA19e7400399a865c0d0779eced67fa135aa9c0fd0d
SHA256a0bd1063192bf459a0a8cccc2dacda17d22181c2f857e3608a81f1e23f48110b
SHA512acb16e9ec338c83a277c427f562b81c8dc6127d4092a4d69d36a2490d815c3bc9afc740893b3c87873aa4b5907153fa8df0bcfd9330974d631bb87e109cc9434