Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
Resource
win10v2004-20230220-en
General
-
Target
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe
-
Size
372KB
-
MD5
98a0648c100d8b13b15302a36d44f0b0
-
SHA1
df228d2c11e1bd4815901c33b005cd1e8d3fae7e
-
SHA256
ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810
-
SHA512
40c1cb44ec29552c9f6e400ef2686c8cb290ac1fe2047ed7c8129d0cd398ed758d8b711c3f24b98b50190b29fa41e9b564d0b401ef0acd9f20756571c9b60dc1
-
SSDEEP
6144:k9O7z0c1gnBs3zybldea4tcSDALykmjD8mkrh3xAJJ6Jc2cT1kA:+c1QB4z64ZtT8Ok0urh3CJea
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\AddGroup.tiff ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\AppMon.txt ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe File created C:\Windows\winlog.txt ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2404 WMIC.exe Token: SeSecurityPrivilege 2404 WMIC.exe Token: SeTakeOwnershipPrivilege 2404 WMIC.exe Token: SeLoadDriverPrivilege 2404 WMIC.exe Token: SeSystemProfilePrivilege 2404 WMIC.exe Token: SeSystemtimePrivilege 2404 WMIC.exe Token: SeProfSingleProcessPrivilege 2404 WMIC.exe Token: SeIncBasePriorityPrivilege 2404 WMIC.exe Token: SeCreatePagefilePrivilege 2404 WMIC.exe Token: SeBackupPrivilege 2404 WMIC.exe Token: SeRestorePrivilege 2404 WMIC.exe Token: SeShutdownPrivilege 2404 WMIC.exe Token: SeDebugPrivilege 2404 WMIC.exe Token: SeSystemEnvironmentPrivilege 2404 WMIC.exe Token: SeRemoteShutdownPrivilege 2404 WMIC.exe Token: SeUndockPrivilege 2404 WMIC.exe Token: SeManageVolumePrivilege 2404 WMIC.exe Token: 33 2404 WMIC.exe Token: 34 2404 WMIC.exe Token: 35 2404 WMIC.exe Token: 36 2404 WMIC.exe Token: SeIncreaseQuotaPrivilege 2404 WMIC.exe Token: SeSecurityPrivilege 2404 WMIC.exe Token: SeTakeOwnershipPrivilege 2404 WMIC.exe Token: SeLoadDriverPrivilege 2404 WMIC.exe Token: SeSystemProfilePrivilege 2404 WMIC.exe Token: SeSystemtimePrivilege 2404 WMIC.exe Token: SeProfSingleProcessPrivilege 2404 WMIC.exe Token: SeIncBasePriorityPrivilege 2404 WMIC.exe Token: SeCreatePagefilePrivilege 2404 WMIC.exe Token: SeBackupPrivilege 2404 WMIC.exe Token: SeRestorePrivilege 2404 WMIC.exe Token: SeShutdownPrivilege 2404 WMIC.exe Token: SeDebugPrivilege 2404 WMIC.exe Token: SeSystemEnvironmentPrivilege 2404 WMIC.exe Token: SeRemoteShutdownPrivilege 2404 WMIC.exe Token: SeUndockPrivilege 2404 WMIC.exe Token: SeManageVolumePrivilege 2404 WMIC.exe Token: 33 2404 WMIC.exe Token: 34 2404 WMIC.exe Token: 35 2404 WMIC.exe Token: 36 2404 WMIC.exe Token: SeDebugPrivilege 2412 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1012 2412 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 88 PID 2412 wrote to memory of 1012 2412 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 88 PID 2412 wrote to memory of 1012 2412 ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe 88 PID 1012 wrote to memory of 2404 1012 cmd.exe 90 PID 1012 wrote to memory of 2404 1012 cmd.exe 90 PID 1012 wrote to memory of 2404 1012 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe"C:\Users\Admin\AppData\Local\Temp\ad0c0b6b81da28344e8444989150b63dc8b21fc88bd0b56fb5b3f7ff233ea810.exe"1⤵
- Modifies extensions of user files
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-