Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 08:14
Behavioral task
behavioral1
Sample
5a1a37fb68eeb445df8c647dab8af952.exe
Resource
win7-20230220-en
General
-
Target
5a1a37fb68eeb445df8c647dab8af952.exe
-
Size
48KB
-
MD5
5a1a37fb68eeb445df8c647dab8af952
-
SHA1
95f2c1a9ae32d39ed616d2007bbcf6f74feba18f
-
SHA256
631d7e6e0d9b03928ea24c0f846e3aad741bd675b8837035e8bdc028dc25fc98
-
SHA512
349c588d9fc96ecf4db16004afec719e00e6ec887a4d89319a150b9ef75b1836fb8dfbff1a1fc0953a0dccf6a27ae117a00cd94c0991ecc70931fd1349cd8d05
-
SSDEEP
768:4g/hgfJYO9KqosayemfSbvZ5l9GCAPk2/PWC/cEnUSBQtP9:R/hgGO9KrHmKbvtelRJnUSBiP9
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6288342522:AAFSUbGsrmP7ztzdv4uDMwLGETn2Ea_tq1M/sendMessage?chat_id=1953693386
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 5a1a37fb68eeb445df8c647dab8af952.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3604 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 5a1a37fb68eeb445df8c647dab8af952.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1752 1920 5a1a37fb68eeb445df8c647dab8af952.exe 84 PID 1920 wrote to memory of 1752 1920 5a1a37fb68eeb445df8c647dab8af952.exe 84 PID 1752 wrote to memory of 1828 1752 cmd.exe 86 PID 1752 wrote to memory of 1828 1752 cmd.exe 86 PID 1752 wrote to memory of 3604 1752 cmd.exe 87 PID 1752 wrote to memory of 3604 1752 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\5a1a37fb68eeb445df8c647dab8af952.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1828
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3604
-
-