Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
Resource
win10v2004-20230220-en
General
-
Target
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
-
Size
372KB
-
MD5
98a0648c100d8b13b15302a36d44f0b0
-
SHA1
df228d2c11e1bd4815901c33b005cd1e8d3fae7e
-
SHA256
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810
-
SHA512
40c1cb44ec29552c9f6e400ef2686c8cb290ac1fe2047ed7c8129d0cd398ed758d8b711c3f24b98b50190b29fa41e9b564d0b401ef0acd9f20756571c9b60dc1
-
SSDEEP
6144:k9O7z0c1gnBs3zybldea4tcSDALykmjD8mkrh3xAJJ6Jc2cT1kA:+c1QB4z64ZtT8Ok0urh3CJea
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CopyConnect.tiff ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\AppMon.txt ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe File created C:\Windows\winlog.txt ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 680 WMIC.exe Token: SeSecurityPrivilege 680 WMIC.exe Token: SeTakeOwnershipPrivilege 680 WMIC.exe Token: SeLoadDriverPrivilege 680 WMIC.exe Token: SeSystemProfilePrivilege 680 WMIC.exe Token: SeSystemtimePrivilege 680 WMIC.exe Token: SeProfSingleProcessPrivilege 680 WMIC.exe Token: SeIncBasePriorityPrivilege 680 WMIC.exe Token: SeCreatePagefilePrivilege 680 WMIC.exe Token: SeBackupPrivilege 680 WMIC.exe Token: SeRestorePrivilege 680 WMIC.exe Token: SeShutdownPrivilege 680 WMIC.exe Token: SeDebugPrivilege 680 WMIC.exe Token: SeSystemEnvironmentPrivilege 680 WMIC.exe Token: SeRemoteShutdownPrivilege 680 WMIC.exe Token: SeUndockPrivilege 680 WMIC.exe Token: SeManageVolumePrivilege 680 WMIC.exe Token: 33 680 WMIC.exe Token: 34 680 WMIC.exe Token: 35 680 WMIC.exe Token: SeIncreaseQuotaPrivilege 680 WMIC.exe Token: SeSecurityPrivilege 680 WMIC.exe Token: SeTakeOwnershipPrivilege 680 WMIC.exe Token: SeLoadDriverPrivilege 680 WMIC.exe Token: SeSystemProfilePrivilege 680 WMIC.exe Token: SeSystemtimePrivilege 680 WMIC.exe Token: SeProfSingleProcessPrivilege 680 WMIC.exe Token: SeIncBasePriorityPrivilege 680 WMIC.exe Token: SeCreatePagefilePrivilege 680 WMIC.exe Token: SeBackupPrivilege 680 WMIC.exe Token: SeRestorePrivilege 680 WMIC.exe Token: SeShutdownPrivilege 680 WMIC.exe Token: SeDebugPrivilege 680 WMIC.exe Token: SeSystemEnvironmentPrivilege 680 WMIC.exe Token: SeRemoteShutdownPrivilege 680 WMIC.exe Token: SeUndockPrivilege 680 WMIC.exe Token: SeManageVolumePrivilege 680 WMIC.exe Token: 33 680 WMIC.exe Token: 34 680 WMIC.exe Token: 35 680 WMIC.exe Token: SeDebugPrivilege 2028 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1740 2028 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 29 PID 2028 wrote to memory of 1740 2028 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 29 PID 2028 wrote to memory of 1740 2028 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 29 PID 2028 wrote to memory of 1740 2028 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 29 PID 1740 wrote to memory of 680 1740 cmd.exe 31 PID 1740 wrote to memory of 680 1740 cmd.exe 31 PID 1740 wrote to memory of 680 1740 cmd.exe 31 PID 1740 wrote to memory of 680 1740 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe"C:\Users\Admin\AppData\Local\Temp\ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe"1⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-