Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe
Resource
win7-20230220-en
General
-
Target
fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe
-
Size
1.9MB
-
MD5
fd37e10f14a82990e48fffa1cf2922a2
-
SHA1
e7a5576b9aa33a05e288f15cbd74945052fbb994
-
SHA256
fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52
-
SHA512
8181c71826dc86c8dc32d8f940bf3a29a4819ef836161f146c35d6e049407397dee838a00cd1726dd15cb32ce6857ad3ff636c825cdcd426d70d447c98bc653f
-
SSDEEP
49152:uwT36Xi/99PlRz8rQ6SugaARI31E+seIeQ2/d2+rS2:ua36SFBlRorQBR41Rs0Q2/gK5
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 oem.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000100000002313f-349.dat upx behavioral2/files/0x000100000002313f-356.dat upx behavioral2/memory/2724-357-0x0000000000400000-0x0000000000680000-memory.dmp upx behavioral2/files/0x000100000002313f-355.dat upx behavioral2/memory/2724-360-0x0000000000400000-0x0000000000680000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2724 1924 fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe 89 PID 1924 wrote to memory of 2724 1924 fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe 89 PID 1924 wrote to memory of 2724 1924 fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe"C:\Users\Admin\AppData\Local\Temp\fbbddfcf827ea76be9ef09d65f97256c6d018b216ebbacb5b3d4368d701b5b52.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\oem.exe"C:\Users\Admin\AppData\Local\Temp\oem.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_hao.360.com_0.localstorage
Filesize320KB
MD5819aac86f97be26aabfbd85f719b3b83
SHA1c7eb2de655d8ddbba0229d8673f40a18d1a0ea64
SHA256e3694f6547b3d3bf49feaa0ae54485ad54092516c275ab2e669554e0c6952ab3
SHA5128fcee3d81c6e40be7c8e0d4884e00a4bfa1c8e683a69e596d7080dc29938f0bc952df72f2ffcda0a12791a202e012052dc36a1f7d6d6653785cbaf8f7108cce9
-
Filesize
881KB
MD575f2202053644685b0306f6dfb2fc1fa
SHA10a48f7a97fef177284a020bf647b201f91e5fbd0
SHA25601224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7
SHA512b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30
-
Filesize
881KB
MD575f2202053644685b0306f6dfb2fc1fa
SHA10a48f7a97fef177284a020bf647b201f91e5fbd0
SHA25601224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7
SHA512b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30
-
Filesize
881KB
MD575f2202053644685b0306f6dfb2fc1fa
SHA10a48f7a97fef177284a020bf647b201f91e5fbd0
SHA25601224939ac638e6021b1d26a780f6696dc3d7d23954d0327077a7c398e89c4d7
SHA512b6c597be87c20b74966334960687690075e26ba0c0f2a876ebdee3a093583c745d65ca5269475eaf0277953f5e6b89651094a2f27c31e946b1154a27bd2d1c30
-
Filesize
5KB
MD5ed1ba832500799ec049639a81e33818c
SHA19eaa887e9ce8ffd7d517982d3d5c97cb148a7063
SHA25616b9946bcbdf32904fb2c2b17b8497170ef109f2604ab227576fdab0b27f9ddb
SHA512f6397f4b0c93dc0f8dd3fcb1325da9ad90edc41b3a6de8a3ca7efb5385c708b97372ba501aabc38b3dcff6984a87130d649db3150c6b74cb4b49b4d42e833030