Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02-11-2023 05:58
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20231023-en
General
-
Target
sample.exe
-
Size
1.2MB
-
MD5
0c8e88877383ccd23a755f429006b437
-
SHA1
69b3d913a3967153d1e91ba1a31ebed839b297ed
-
SHA256
a864282fea5a536510ae86c77ce46f7827687783628e4f2ceb5bf2c41b8cd3c6
-
SHA512
ba5296a84b7107b293d1afd4752157edaa1a3f1059685ecad2ddea9b9221ee9c8092ce5cae6f2f6a4866e25ca0bf66dd3fbc0786b2a26cb708d2cd536dd85041
-
SSDEEP
24576:utP7hdO1s6Skscec1SgnyN9HPFCCNhQI6GOfaFVIVrYwcMavDiZn3m75/J7:gLO1qkscec0gnyN9HPFCCNSI6GOfaFVp
Malware Config
Signatures
-
Renames multiple (678) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\bg.jpg" reg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 624 2880 sample.exe 30 PID 2880 wrote to memory of 624 2880 sample.exe 30 PID 2880 wrote to memory of 624 2880 sample.exe 30 PID 624 wrote to memory of 1408 624 cmd.exe 31 PID 624 wrote to memory of 1408 624 cmd.exe 31 PID 624 wrote to memory of 1408 624 cmd.exe 31 PID 1408 wrote to memory of 3052 1408 cmd.exe 32 PID 1408 wrote to memory of 3052 1408 cmd.exe 32 PID 1408 wrote to memory of 3052 1408 cmd.exe 32 PID 2880 wrote to memory of 1464 2880 sample.exe 33 PID 2880 wrote to memory of 1464 2880 sample.exe 33 PID 2880 wrote to memory of 1464 2880 sample.exe 33 PID 1464 wrote to memory of 276 1464 cmd.exe 34 PID 1464 wrote to memory of 276 1464 cmd.exe 34 PID 1464 wrote to memory of 276 1464 cmd.exe 34 PID 276 wrote to memory of 1808 276 cmd.exe 35 PID 276 wrote to memory of 1808 276 cmd.exe 35 PID 276 wrote to memory of 1808 276 cmd.exe 35 PID 2880 wrote to memory of 1708 2880 sample.exe 36 PID 2880 wrote to memory of 1708 2880 sample.exe 36 PID 2880 wrote to memory of 1708 2880 sample.exe 36 PID 1708 wrote to memory of 304 1708 cmd.exe 37 PID 1708 wrote to memory of 304 1708 cmd.exe 37 PID 1708 wrote to memory of 304 1708 cmd.exe 37 PID 304 wrote to memory of 2452 304 cmd.exe 38 PID 304 wrote to memory of 2452 304 cmd.exe 38 PID 304 wrote to memory of 2452 304 cmd.exe 38 PID 2880 wrote to memory of 2224 2880 sample.exe 39 PID 2880 wrote to memory of 2224 2880 sample.exe 39 PID 2880 wrote to memory of 2224 2880 sample.exe 39 PID 2224 wrote to memory of 2168 2224 cmd.exe 40 PID 2224 wrote to memory of 2168 2224 cmd.exe 40 PID 2224 wrote to memory of 2168 2224 cmd.exe 40 PID 2168 wrote to memory of 2400 2168 cmd.exe 41 PID 2168 wrote to memory of 2400 2168 cmd.exe 41 PID 2168 wrote to memory of 2400 2168 cmd.exe 41 PID 2880 wrote to memory of 108 2880 sample.exe 42 PID 2880 wrote to memory of 108 2880 sample.exe 42 PID 2880 wrote to memory of 108 2880 sample.exe 42 PID 108 wrote to memory of 2456 108 cmd.exe 43 PID 108 wrote to memory of 2456 108 cmd.exe 43 PID 108 wrote to memory of 2456 108 cmd.exe 43 PID 2456 wrote to memory of 1796 2456 cmd.exe 44 PID 2456 wrote to memory of 1796 2456 cmd.exe 44 PID 2456 wrote to memory of 1796 2456 cmd.exe 44 PID 2880 wrote to memory of 1792 2880 sample.exe 45 PID 2880 wrote to memory of 1792 2880 sample.exe 45 PID 2880 wrote to memory of 1792 2880 sample.exe 45 PID 1792 wrote to memory of 876 1792 cmd.exe 46 PID 1792 wrote to memory of 876 1792 cmd.exe 46 PID 1792 wrote to memory of 876 1792 cmd.exe 46 PID 876 wrote to memory of 272 876 cmd.exe 47 PID 876 wrote to memory of 272 876 cmd.exe 47 PID 876 wrote to memory of 272 876 cmd.exe 47 PID 2880 wrote to memory of 2116 2880 sample.exe 48 PID 2880 wrote to memory of 2116 2880 sample.exe 48 PID 2880 wrote to memory of 2116 2880 sample.exe 48 PID 2116 wrote to memory of 1192 2116 cmd.exe 49 PID 2116 wrote to memory of 1192 2116 cmd.exe 49 PID 2116 wrote to memory of 1192 2116 cmd.exe 49 PID 1192 wrote to memory of 2528 1192 cmd.exe 50 PID 1192 wrote to memory of 2528 1192 cmd.exe 50 PID 1192 wrote to memory of 2528 1192 cmd.exe 50 PID 2880 wrote to memory of 2640 2880 sample.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f2⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f3⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v Wallpaper /f4⤵PID:3052
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\cmd.execmd.exe /c reg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f3⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\system32\reg.exereg delete "HKCU\Conttol Panel\Desktop" /v WallpaperStyle /f4⤵PID:1808
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2452
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop" /v NoChangingWallPaper /t REG_SZ /d 1 /f4⤵PID:2400
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵
- Sets desktop wallpaper using registry
PID:1796
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f3⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v Wallpaper /t REG_SZ /d "C:\Users\Public\bg.jpg" /f4⤵PID:272
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2528
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f2⤵PID:2640
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f3⤵PID:1536
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d 2 /f4⤵PID:2128
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe user32.dll,UpdatePerUserSystemParameters2⤵PID:1572
-
C:\Windows\system32\rundll32.exerundll32.exe user32.dll,UpdatePerUserSystemParameters3⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\sample.exe" -ErrorAction SilentlyContinue;2⤵PID:2344
-
C:\Windows\system32\cmd.execmd.exe /c start powershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\sample.exe" -ErrorAction SilentlyContinue;3⤵PID:2164
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Sleep -Milliseconds 500; Remove-Item -Force -Path "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\sample.exe" -ErrorAction SilentlyContinue;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
-