Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
Expert-PC-2023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Expert-PC-2023.exe
Resource
win10v2004-20230220-en
General
-
Target
Expert-PC-2023.exe
-
Size
730.9MB
-
MD5
1cc87e637e55a2e6a88c745855423045
-
SHA1
7e837f0a6854e6f0b68f417bb8f5f8dc2daeee23
-
SHA256
6148a04932be8b508c730fae9b7a8b67d96bd5bd21801a047e34a8e819a55c62
-
SHA512
c23bce8c05365d9e626f2b6d49e3d74608c55a31977eaa01981962f105abed5a3c30ebd18a3a0c5c8bdb29c9746227ce063a093964edf367262bfab27bfd2827
-
SSDEEP
196608:UUJOFXQovEaJV73j5m9iepb+EDGVV3hCKboTEWMw6FO5+3Z4KW:UEfovJ13jk9Xp+VVRJbdwRiDW
Malware Config
Extracted
raccoon
9429a6d92284fd6d41daa221d04032be
http://212.113.119.153/
http://77.91.84.147/
http://212.113.119.35/
http://79.137.248.245/
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 956 yz5QbPVN.exe 884 4IxLg0UY.exe 1056 88jgdhdI.exe -
Loads dropped DLL 6 IoCs
pid Process 2032 Expert-PC-2023.exe 2032 Expert-PC-2023.exe 2032 Expert-PC-2023.exe 2032 Expert-PC-2023.exe 2032 Expert-PC-2023.exe 2032 Expert-PC-2023.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 956 set thread context of 1928 956 yz5QbPVN.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1896 1928 WerFault.exe 30 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Expert-PC-2023.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Expert-PC-2023.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 Expert-PC-2023.exe 1056 88jgdhdI.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2032 wrote to memory of 956 2032 Expert-PC-2023.exe 28 PID 2032 wrote to memory of 956 2032 Expert-PC-2023.exe 28 PID 2032 wrote to memory of 956 2032 Expert-PC-2023.exe 28 PID 2032 wrote to memory of 956 2032 Expert-PC-2023.exe 28 PID 2032 wrote to memory of 884 2032 Expert-PC-2023.exe 31 PID 2032 wrote to memory of 884 2032 Expert-PC-2023.exe 31 PID 2032 wrote to memory of 884 2032 Expert-PC-2023.exe 31 PID 2032 wrote to memory of 884 2032 Expert-PC-2023.exe 31 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 956 wrote to memory of 1928 956 yz5QbPVN.exe 30 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 1928 wrote to memory of 1896 1928 AppLaunch.exe 32 PID 2032 wrote to memory of 1056 2032 Expert-PC-2023.exe 33 PID 2032 wrote to memory of 1056 2032 Expert-PC-2023.exe 33 PID 2032 wrote to memory of 1056 2032 Expert-PC-2023.exe 33 PID 2032 wrote to memory of 1056 2032 Expert-PC-2023.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Expert-PC-2023.exe"C:\Users\Admin\AppData\Local\Temp\Expert-PC-2023.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\LocalLow\yz5QbPVN.exe"C:\Users\Admin\AppData\LocalLow\yz5QbPVN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 6844⤵
- Program crash
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe"C:\Users\Admin\AppData\Roaming\4IxLg0UY.exe"2⤵
- Executes dropped EXE
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe"C:\Users\Admin\AppData\Local\Temp\88jgdhdI.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5d368e0e221d5e7daf9d4dc2825136dac
SHA1448008dbad33ef3dc02431b7f7e7fb7ffb6e1e40
SHA256d981feca3b0fb43369c3b0fdbb5e4fe6d66631ca6bdb706e8e52a4e849f484da
SHA51275ab7f199b06a0d36d10c8602cb45df3bdced1c6239be7a5af3a10332b5c8a4e0d9c4477af0880d78b6e77679d7bc96cb441ca49e8f77572b9811fc19321c17a
-
Filesize
277.6MB
MD54d6da7e30acaf3216b0c89fbe4bc1fd1
SHA160dfcdbf1d5782bf831ce76532ae479b8d547e53
SHA256c79690aa69adfc71315c88f66dcece3d1ab07821ff02294effc41b4427a6d7f7
SHA512e23350d0e672f5ad0fd4482551ce0b1186a5d1a98edab2d16f8a076078a8d39a211e0b26db7543b2e5ae724217e78d810306f094bf190d840d7669f005a57642
-
Filesize
256.8MB
MD52d37a52665c9296c6eec1f92c5c9da6b
SHA1caae55ce6d92935a6c818860c6ada8ed5da12c00
SHA256b990d589316a037c9fe16adb85e9dafd9b85749a3259cc58e7fe67fe3009e89e
SHA51232b51ee498a60881b1d928f9da072f6f46ff2fdf9e2180b78382b6c4dcb9ac8639ca554aceacc47cd587c6db31576fe30d899996437e6ff0ceb9b42e175a8f1d
-
Filesize
48KB
MD5a23629286d856fa79cdf0d0012746bd7
SHA1f5879c4d4506f750fe2cc510c8aedf5a6db462d6
SHA256b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a
SHA51299ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde
-
Filesize
48KB
MD5a23629286d856fa79cdf0d0012746bd7
SHA1f5879c4d4506f750fe2cc510c8aedf5a6db462d6
SHA256b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a
SHA51299ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
308KB
MD5d368e0e221d5e7daf9d4dc2825136dac
SHA1448008dbad33ef3dc02431b7f7e7fb7ffb6e1e40
SHA256d981feca3b0fb43369c3b0fdbb5e4fe6d66631ca6bdb706e8e52a4e849f484da
SHA51275ab7f199b06a0d36d10c8602cb45df3bdced1c6239be7a5af3a10332b5c8a4e0d9c4477af0880d78b6e77679d7bc96cb441ca49e8f77572b9811fc19321c17a
-
Filesize
261.4MB
MD59067775bdd0011e6dbb9e07471be14e3
SHA1c542963881ce9d1f0d73b8cd28fa19f5dcc4d5a3
SHA25633a3b0e3df96fc295a6d844585cf3858d906d9e3d33ca8284b9e1e139ec077e6
SHA51211502c6e5589eebb9931b253d7d816693a4957e52c33ef50eb817238819e41c48fb4aa09a50284e9cd98a7b6c480a1e0656b0ba48592370354e636bbcbf21c67
-
Filesize
48KB
MD5a23629286d856fa79cdf0d0012746bd7
SHA1f5879c4d4506f750fe2cc510c8aedf5a6db462d6
SHA256b7ff7973cae49e3e8bafe21ee7b7c7a6b713c2893cefa844c5f4ff134403118a
SHA51299ea72147871288d65bc817d960c42a1e3f64dc29f972dd094fbea2f3764cadbec6470efe1458844653f87fa8aff862e91b83cc4c84632f69b8fa5685f1c7cde