Analysis
-
max time kernel
113s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
5a1a37fb68eeb445df8c647dab8af952.exe
Resource
win7-20230220-en
General
-
Target
5a1a37fb68eeb445df8c647dab8af952.exe
-
Size
48KB
-
MD5
5a1a37fb68eeb445df8c647dab8af952
-
SHA1
95f2c1a9ae32d39ed616d2007bbcf6f74feba18f
-
SHA256
631d7e6e0d9b03928ea24c0f846e3aad741bd675b8837035e8bdc028dc25fc98
-
SHA512
349c588d9fc96ecf4db16004afec719e00e6ec887a4d89319a150b9ef75b1836fb8dfbff1a1fc0953a0dccf6a27ae117a00cd94c0991ecc70931fd1349cd8d05
-
SSDEEP
768:4g/hgfJYO9KqosayemfSbvZ5l9GCAPk2/PWC/cEnUSBQtP9:R/hgGO9KrHmKbvtelRJnUSBiP9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 5a1a37fb68eeb445df8c647dab8af952.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3508 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 5a1a37fb68eeb445df8c647dab8af952.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4900 wrote to memory of 112 4900 5a1a37fb68eeb445df8c647dab8af952.exe 88 PID 4900 wrote to memory of 112 4900 5a1a37fb68eeb445df8c647dab8af952.exe 88 PID 112 wrote to memory of 2652 112 cmd.exe 90 PID 112 wrote to memory of 2652 112 cmd.exe 90 PID 112 wrote to memory of 3508 112 cmd.exe 91 PID 112 wrote to memory of 3508 112 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3508
-
-