Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 13:44
Behavioral task
behavioral1
Sample
f19126b02be0b331982e041dc9bcad51.exe
Resource
win7-20230220-en
General
-
Target
f19126b02be0b331982e041dc9bcad51.exe
-
Size
223KB
-
MD5
f19126b02be0b331982e041dc9bcad51
-
SHA1
10ab04a6f24ce4540a564041375d8275a691e409
-
SHA256
2869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
-
SHA512
e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
SSDEEP
3072:fvfoUJQCw+d+Uoj9DVbDWb0Cdfc6mdSCFytxpNS17e+8TNBfxz9l:fvfoOQHelqJbD4HJe7FytVSle+8TxX
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5975822207:AAFJtzAlzLoF8RfkpKUagQJGRi0ksib6w3g/sendMessage?chat_id=1396661331
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation f19126b02be0b331982e041dc9bcad51.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation f19126b02be0b331982e041dc9bcad51.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation f19126b02be0b331982e041dc9bcad51.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation f19126b02be0b331982e041dc9bcad51.exe -
Executes dropped EXE 6 IoCs
pid Process 3764 f19126b02be0b331982e041dc9bcad51.exe 3492 tor.exe 1824 f19126b02be0b331982e041dc9bcad51.exe 3196 tor.exe 1528 f19126b02be0b331982e041dc9bcad51.exe 1992 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1764 1824 WerFault.exe 101 464 1528 WerFault.exe 106 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4448 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3764 f19126b02be0b331982e041dc9bcad51.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1796 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 3764 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 1824 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 1528 f19126b02be0b331982e041dc9bcad51.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1796 wrote to memory of 3736 1796 f19126b02be0b331982e041dc9bcad51.exe 84 PID 1796 wrote to memory of 3736 1796 f19126b02be0b331982e041dc9bcad51.exe 84 PID 3736 wrote to memory of 1992 3736 cmd.exe 86 PID 3736 wrote to memory of 1992 3736 cmd.exe 86 PID 3736 wrote to memory of 4448 3736 cmd.exe 87 PID 3736 wrote to memory of 4448 3736 cmd.exe 87 PID 3736 wrote to memory of 4376 3736 cmd.exe 88 PID 3736 wrote to memory of 4376 3736 cmd.exe 88 PID 3736 wrote to memory of 3764 3736 cmd.exe 89 PID 3736 wrote to memory of 3764 3736 cmd.exe 89 PID 3764 wrote to memory of 3596 3764 f19126b02be0b331982e041dc9bcad51.exe 93 PID 3764 wrote to memory of 3596 3764 f19126b02be0b331982e041dc9bcad51.exe 93 PID 3764 wrote to memory of 3492 3764 f19126b02be0b331982e041dc9bcad51.exe 95 PID 3764 wrote to memory of 3492 3764 f19126b02be0b331982e041dc9bcad51.exe 95 PID 1824 wrote to memory of 3196 1824 f19126b02be0b331982e041dc9bcad51.exe 102 PID 1824 wrote to memory of 3196 1824 f19126b02be0b331982e041dc9bcad51.exe 102 PID 1528 wrote to memory of 1992 1528 f19126b02be0b331982e041dc9bcad51.exe 107 PID 1528 wrote to memory of 1992 1528 f19126b02be0b331982e041dc9bcad51.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe" &&START "" "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4448
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4376
-
-
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp8E5A.tmp" -C "C:\Users\Admin\AppData\Local\i86t5yhbwx"4⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe"C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\i86t5yhbwx\torrc.txt"4⤵
- Executes dropped EXE
PID:3492
-
-
-
-
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exeC:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe"C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\i86t5yhbwx\torrc.txt"2⤵
- Executes dropped EXE
PID:3196
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1824 -s 19922⤵
- Program crash
PID:1764
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 1824 -ip 18241⤵PID:4968
-
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exeC:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe"C:\Users\Admin\AppData\Local\i86t5yhbwx\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\i86t5yhbwx\torrc.txt"2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1528 -s 22682⤵
- Program crash
PID:464
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 508 -p 1528 -ip 15281⤵PID:2760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc1be6f3f52d5c841af91f8fc3f790cb
SHA1ac79b4229e0a0ce378ae22fc6104748c5f234511
SHA2566da862f7c7feffca99cd58712ece93928c6ca6aed617f5d8c10a4718eaa2a910
SHA5122f46165017309ee1a0c1b23e30a71e52e86ad8933e2649bf58c3f4628c5aa75659f5b8f6be32c2882f220b2f3ff2fd50d8766bf0a3708c94c2c634c051a05ea6
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.3MB
MD57f55b9f34c9cbd30e19197ee1d87dc8e
SHA1cd9cf68f469848ba6e5bd08265a2e82282d048eb
SHA256d47d9c83e6fe77c3ffcdc15077f348cafa5be86becd65980ec0fb9d9c003f197
SHA5120a3bf8fa6ca0c7a9332aa0941ab9fc70765013aba96132f2c9256cb21edae8872737154721886c363969dad05fd7465dcb4afdbf2f1fe368e9f43b21cce37f52
-
Filesize
7.9MB
MD55f091cae9c8e29f46904fce7fb81b904
SHA110cc62de0f33cc6ae702d63cc70b7b1fdad7aadb
SHA256d98bd18422b372f793303b86bef1d429c8d4a078aee2a7d8b0943d7b0ab07f48
SHA5123182e4a8031b151318e30dc87ef3c0e67e8af21a6fd82016dda17975246c0d0f98b4d4351177241fe089d8c2ccedce4120633d58b231154cfecaa71d47c6de57
-
Filesize
64B
MD5945b5f7fe372d8fa5e105d1800d2cd19
SHA1374d408e91e01196e752426a474242413acf84b5
SHA256d024ea5491fc0c790dcf9b9793e931f6ac20223d963b302f174267e917f3e6a1
SHA512d681e2d7b82ab2aabf7119d8505f07340b417d4964aeb78abe09f7f98034c7377e767ec9cb2bda6fbfb0f0bbcf77dcd38a5a834f5ac2cbc163d782ad39c0f187
-
Filesize
4B
MD587784eca6b0dea1dff92478fb786b401
SHA11ada5d1d8c5966b872190c472e8608536971afa2
SHA256264fd4d30b6f069df5be7cd14c3a167a0fc59fe221b02453bb697911aa973957
SHA51260d3c2cc81b18458f1e63e8e5919869d3b646b26c2ce7e819781109dc561bac82ef02afe89768af595ba90fe5d43998ea3363389027733dbd61c3d52ad3ba9a4
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD559bdf4821e51b73edc3c84432bba73be
SHA113958fb77bff75e3203c027f49d655dd3741ee94
SHA2560a718b93141dca3bfb0f7cc933e86af0765517340dbfc7a05f1c7f0f09a6fb47
SHA5125c1e14eb23aa4e1c186707e82cbf14ff77b100acdc2c92148cbcc406ed50b45c1efa0831afa45cb1e3cb7e02845ecc6d9e33912f5bab40574a728e235dba3c60