Analysis
-
max time kernel
14s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2023 13:31
Behavioral task
behavioral1
Sample
build_4.exe
Resource
win7-20230712-en
General
-
Target
build_4.exe
-
Size
165KB
-
MD5
547933c1a8ea0eb111e619d70ca2c657
-
SHA1
aca394a095c3951ace115ac621a67df1ff4d2e33
-
SHA256
fdc83f58a30b80240c5887c6646324600f3896421059b80caddacfdb196287ea
-
SHA512
5df1b41c5f19e304cc0758b175252c17cc6ccb1d3d91ba2f153138dfbd8e2ef3cd6efe8a136559c55952bdb43a7f206f7ba4e04674ee95363ca8409e48745c2b
-
SSDEEP
1536:ROwwIJbzij3pPEOGFmd8Szav8IDYFUxT1DR5jPVSBSVG41AG9wL4yXacCwPIC6Xi:RyIlz2p8Yai3GNzDeeb4FzeDGwKSHqj
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6193093056:AAHzyNGUGS9aUG6CCx6ENLoXpCFLzEQywIQ/sendMessage?chat_id=1098292643
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation build_4.exe Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation build_4.exe -
Executes dropped EXE 3 IoCs
pid Process 4864 build_4.exe 2692 tor.exe 2936 build_4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3968 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2848 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4864 build_4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 build_4.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1356 3624 build_4.exe 86 PID 3624 wrote to memory of 1356 3624 build_4.exe 86 PID 1356 wrote to memory of 2396 1356 cmd.exe 87 PID 1356 wrote to memory of 2396 1356 cmd.exe 87 PID 1356 wrote to memory of 2848 1356 cmd.exe 88 PID 1356 wrote to memory of 2848 1356 cmd.exe 88 PID 1356 wrote to memory of 3968 1356 cmd.exe 92 PID 1356 wrote to memory of 3968 1356 cmd.exe 92 PID 1356 wrote to memory of 4864 1356 cmd.exe 93 PID 1356 wrote to memory of 4864 1356 cmd.exe 93 PID 4864 wrote to memory of 2312 4864 build_4.exe 96 PID 4864 wrote to memory of 2312 4864 build_4.exe 96 PID 4864 wrote to memory of 2692 4864 build_4.exe 99 PID 4864 wrote to memory of 2692 4864 build_4.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\build_4.exe"C:\Users\Admin\AppData\Local\Temp\build_4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "build_4" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\build_4.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\build_4.exe" &&START "" "C:\Users\Admin\AppData\Local\NET.Framework\build_4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2396
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2848
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "build_4" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\build_4.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3968
-
-
C:\Users\Admin\AppData\Local\NET.Framework\build_4.exe"C:\Users\Admin\AppData\Local\NET.Framework\build_4.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp99EE.tmp" -C "C:\Users\Admin\AppData\Local\d92pmiifqt"4⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\d92pmiifqt\tor\tor.exe"C:\Users\Admin\AppData\Local\d92pmiifqt\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\d92pmiifqt\torrc.txt"4⤵
- Executes dropped EXE
PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\NET.Framework\build_4.exeC:\Users\Admin\AppData\Local\NET.Framework\build_4.exe1⤵
- Executes dropped EXE
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
165KB
MD5547933c1a8ea0eb111e619d70ca2c657
SHA1aca394a095c3951ace115ac621a67df1ff4d2e33
SHA256fdc83f58a30b80240c5887c6646324600f3896421059b80caddacfdb196287ea
SHA5125df1b41c5f19e304cc0758b175252c17cc6ccb1d3d91ba2f153138dfbd8e2ef3cd6efe8a136559c55952bdb43a7f206f7ba4e04674ee95363ca8409e48745c2b
-
Filesize
165KB
MD5547933c1a8ea0eb111e619d70ca2c657
SHA1aca394a095c3951ace115ac621a67df1ff4d2e33
SHA256fdc83f58a30b80240c5887c6646324600f3896421059b80caddacfdb196287ea
SHA5125df1b41c5f19e304cc0758b175252c17cc6ccb1d3d91ba2f153138dfbd8e2ef3cd6efe8a136559c55952bdb43a7f206f7ba4e04674ee95363ca8409e48745c2b
-
Filesize
165KB
MD5547933c1a8ea0eb111e619d70ca2c657
SHA1aca394a095c3951ace115ac621a67df1ff4d2e33
SHA256fdc83f58a30b80240c5887c6646324600f3896421059b80caddacfdb196287ea
SHA5125df1b41c5f19e304cc0758b175252c17cc6ccb1d3d91ba2f153138dfbd8e2ef3cd6efe8a136559c55952bdb43a7f206f7ba4e04674ee95363ca8409e48745c2b
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.4MB
MD59c51572e470c337066703261d26f0828
SHA1f8698e779dbfb6e768a73c283cf105147cfa5f36
SHA256e69a860ddf121131d36f11b84359753b3c9991c488469345f6f0c6f4640afbf1
SHA5123ac421923caec92941d7ba150669e1ebd975096263ced3f82e7bce9d80a0bf72f080158d40d8d4afcbd8512cf8d4d83056a981f2a7237dfc1312899dee743390
-
Filesize
64B
MD58fd12c735dcbc2c813b96daa1534d2e1
SHA1c1ec8458a9f9ccb53cfe8b9f1194a8476ba4bd8e
SHA256c395ede6bc68b23bfca363d514099ea0bee6eb7d06016dbb82cae66b7cf4c0b3
SHA51273c1e511c1995e5eac0c9b7a0cb69d16530a871b3e09d429272ba40b61cc7cbb8b5875abbf38d57ee45c355e73e9fe615d7dfb266f3dde30c9b7d17fdd1133f2
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD5d8d2f1fb89b09bc19b8a6b409385c2ba
SHA17ffcc834b82f29f7450c31f23e63eff3f0f4c3a9
SHA2560e81fe4f83b56bf75ca34cdb7d1ae4c3fd89930557495eba78898413513475b9
SHA512f5ec1d984a5eb6981297622bdcba069f628e6ff3dee892ff9bdf056d269780c605e9ade5bcd9f4feb5f08d2680a07f77df9d30fe6b8b9695e98f34c69dc397fb