Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 14:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
111KB
-
MD5
5b45640a3bd4fdc32df75aa462f5a167
-
SHA1
fdc2b61ca7b5c31ba48155d364b8797990e2eaee
-
SHA256
2e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
-
SHA512
3f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963
-
SSDEEP
3072:lb4MOYUuQaS+T8sv8X31OjqOjNhOYRbxqH8QW2zCrAZuRs5:wYUuQaS+T8sv8X31OXN1bgl
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 rat.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4904 schtasks.exe 2380 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3216 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4396 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5116 rat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe 5116 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3908 file.exe Token: SeDebugPrivilege 4396 tasklist.exe Token: SeDebugPrivilege 5116 rat.exe Token: SeDebugPrivilege 5116 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5116 rat.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4904 3908 file.exe 85 PID 3908 wrote to memory of 4904 3908 file.exe 85 PID 3908 wrote to memory of 4220 3908 file.exe 87 PID 3908 wrote to memory of 4220 3908 file.exe 87 PID 4220 wrote to memory of 4396 4220 cmd.exe 89 PID 4220 wrote to memory of 4396 4220 cmd.exe 89 PID 4220 wrote to memory of 3352 4220 cmd.exe 90 PID 4220 wrote to memory of 3352 4220 cmd.exe 90 PID 4220 wrote to memory of 3216 4220 cmd.exe 91 PID 4220 wrote to memory of 3216 4220 cmd.exe 91 PID 4220 wrote to memory of 5116 4220 cmd.exe 92 PID 4220 wrote to memory of 5116 4220 cmd.exe 92 PID 5116 wrote to memory of 2380 5116 rat.exe 94 PID 5116 wrote to memory of 2380 5116 rat.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp92AF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp92AF.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3908"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3352
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3216
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:2380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5f96a89e958dbc581769ae47992099ac2
SHA121adfc348faeee6bc7a4ac796a931247964c1561
SHA256c7ca8d0708476770f11ee9f87307f1e852158776d1fb1ac3eb342a2cdbb78a33
SHA512be6d4d28ef2e898e4e2fc71b564bbbe9fb486af66b0f8c701331e5b63e2d6848452f861021488441b9a2aad6045b4185d61600d8da7070fbd6e289bd5df35d1b
-
Filesize
111KB
MD55b45640a3bd4fdc32df75aa462f5a167
SHA1fdc2b61ca7b5c31ba48155d364b8797990e2eaee
SHA2562e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
SHA5123f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963
-
Filesize
111KB
MD55b45640a3bd4fdc32df75aa462f5a167
SHA1fdc2b61ca7b5c31ba48155d364b8797990e2eaee
SHA2562e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
SHA5123f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963