Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2023 11:16
Static task
static1
Behavioral task
behavioral1
Sample
attachment_2137.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
attachment_2137.exe
Resource
win10v2004-20231215-en
General
-
Target
attachment_2137.exe
-
Size
6.0MB
-
MD5
37580d09f99717268666e091c21d344a
-
SHA1
0b7df2ebdf61753c183c818db71b4b1f6fd57841
-
SHA256
12d9848e317dcbf7dfb95649d7198fd93475f8b4cd093a252f28caeed8093001
-
SHA512
f2a1295003d64be1c768afbc6bd0f93ba53a39a883759952246371d9552777432193c35a702697061febb192cb365843480cc52c3dc44d90312a4e8be7e66749
-
SSDEEP
98304:JyQZRhelFuTw99bP/nCURx/PKnBWrmVjefsn+1:sQ7w99GURx/PKwQe
Malware Config
Extracted
bitrat
1.35
snkno.duckdns.org:43413
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
attachment_2137.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation attachment_2137.exe -
Executes dropped EXE 2 IoCs
Processes:
iCloud.exeAddInProcess32.exepid process 4872 iCloud.exe 4972 AddInProcess32.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/880-6-0x0000000006000000-0x0000000006028000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\apple = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\iCloud.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
iCloud.exedescription pid process target process PID 4872 set thread context of 4972 4872 iCloud.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4404 4972 WerFault.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
attachment_2137.exeiCloud.exepid process 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 880 attachment_2137.exe 4872 iCloud.exe 4872 iCloud.exe 4872 iCloud.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
attachment_2137.exeiCloud.exedescription pid process Token: SeDebugPrivilege 880 attachment_2137.exe Token: SeDebugPrivilege 4872 iCloud.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
attachment_2137.execmd.exeiCloud.exedescription pid process target process PID 880 wrote to memory of 3808 880 attachment_2137.exe cmd.exe PID 880 wrote to memory of 3808 880 attachment_2137.exe cmd.exe PID 880 wrote to memory of 3808 880 attachment_2137.exe cmd.exe PID 3808 wrote to memory of 4572 3808 cmd.exe reg.exe PID 3808 wrote to memory of 4572 3808 cmd.exe reg.exe PID 3808 wrote to memory of 4572 3808 cmd.exe reg.exe PID 880 wrote to memory of 4872 880 attachment_2137.exe iCloud.exe PID 880 wrote to memory of 4872 880 attachment_2137.exe iCloud.exe PID 880 wrote to memory of 4872 880 attachment_2137.exe iCloud.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe PID 4872 wrote to memory of 4972 4872 iCloud.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\attachment_2137.exe"C:\Users\Admin\AppData\Local\Temp\attachment_2137.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "apple" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 1884⤵
- Program crash
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "apple" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exe"1⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4972 -ip 49721⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
27KB
MD52a56c451b199ad006d251c596e2fcce3
SHA193ed1eedb4893c33b9290b2ba29b6e5bc7fbdf65
SHA2561dd42ade54f5b597188c41c780b91c0e5306d2df1e5957679be0ac8f038d2183
SHA512b0d3070d2756e237b2ce20f0f7cd45c2ed2a93e95a6bebbc8099ce51de4361de7e28fe12f35dec70a3350e8a0f915934987d7c1556dc1d70fb185fa8e9de906d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exeFilesize
64KB
MD5480134573228a16dbf9dced2cec9b365
SHA1936c46a635eccb5616c99b9325a99834b827bba7
SHA256e2a7f11ffefb8e2e2b5ccbe8b858d0a571d3cc71aaa04d468201924a044f269b
SHA5128ffe35d425fa2d630203fd84a72473b9e8c8a295044e152d3f5a081d3f3f6bddd4f4c4ec56381a12afa36d484ec065471e1ae141307dc0f41a43ab3f9c443e7b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exeFilesize
19KB
MD5087f408938994ea479e278115cc6805d
SHA175a0fa6383204d86db63d544ba1f2edbe27c9b12
SHA2562b313f70264cc8bee5b91c1331a41723fa8a0c0de8a2b8f215e346f6bf90012a
SHA512ce30362baed179109b8ad348ee2add81174c5d4ab93b9c873a2c2c351a29a81603ede3061ead1651d4136d472ea4fc622a45b70a289b4ff6934f679f6c87314d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\iCloud.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/880-8-0x0000000007270000-0x0000000007292000-memory.dmpFilesize
136KB
-
memory/880-3-0x0000000005B20000-0x0000000005BB2000-memory.dmpFilesize
584KB
-
memory/880-6-0x0000000006000000-0x0000000006028000-memory.dmpFilesize
160KB
-
memory/880-1-0x0000000000A80000-0x000000000108C000-memory.dmpFilesize
6.0MB
-
memory/880-7-0x00000000072B0000-0x0000000007316000-memory.dmpFilesize
408KB
-
memory/880-9-0x0000000005E30000-0x0000000005E40000-memory.dmpFilesize
64KB
-
memory/880-10-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/880-11-0x0000000005E30000-0x0000000005E40000-memory.dmpFilesize
64KB
-
memory/880-12-0x0000000005E30000-0x0000000005E40000-memory.dmpFilesize
64KB
-
memory/880-5-0x0000000005E30000-0x0000000005E40000-memory.dmpFilesize
64KB
-
memory/880-4-0x0000000005BC0000-0x0000000005C5C000-memory.dmpFilesize
624KB
-
memory/880-2-0x0000000006030000-0x00000000065D4000-memory.dmpFilesize
5.6MB
-
memory/880-0-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/880-26-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/4872-28-0x0000000005990000-0x00000000059A0000-memory.dmpFilesize
64KB
-
memory/4872-29-0x0000000005990000-0x00000000059A0000-memory.dmpFilesize
64KB
-
memory/4872-30-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/4872-31-0x0000000005990000-0x00000000059A0000-memory.dmpFilesize
64KB
-
memory/4872-33-0x0000000006FB0000-0x0000000006FB6000-memory.dmpFilesize
24KB
-
memory/4872-32-0x00000000032A0000-0x00000000032B4000-memory.dmpFilesize
80KB
-
memory/4872-27-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/4972-37-0x0000000000700000-0x0000000000ACE000-memory.dmpFilesize
3.8MB
-
memory/4972-41-0x0000000000700000-0x0000000000ACE000-memory.dmpFilesize
3.8MB
-
memory/4972-45-0x0000000000700000-0x0000000000ACE000-memory.dmpFilesize
3.8MB