Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
a5e7145dc17d160b41d36dbea524c3f0.exe
Resource
win7-20240221-en
General
-
Target
a5e7145dc17d160b41d36dbea524c3f0.exe
-
Size
871KB
-
MD5
a5e7145dc17d160b41d36dbea524c3f0
-
SHA1
2ad6faea0f967df37e404d14a4c1ccca607a924e
-
SHA256
99dfe0c0529b4122889ac7023330f2749df048d0b11a91e92155d991e189f0d8
-
SHA512
672a08a7e62b1129cc2997dd77e1709e86281d89d6ab88d12e771120b7a7a15638b9e2e110d3f95cf04e319da31dedbac4727d8b67e2a2343c68d280967d83c9
-
SSDEEP
24576:GR1wvcupUr/Tbp0g7kpRmxC98+/WQ8mkU:AfupUzTbmzpRtWzmL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a5e7145dc17d160b41d36dbea524c3f0.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000\Control Panel\International\Geo\Nation a5e7145dc17d160b41d36dbea524c3f0.exe -
Executes dropped EXE 2 IoCs
Processes:
1.exe2.exepid Process 4008 1.exe 1356 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 wtfismyip.com 20 wtfismyip.com 21 api.ipify.org 23 api.ipify.org 34 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4296 1356 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
2.exe1.exepid Process 1356 2.exe 4008 1.exe 4008 1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2.exe1.exedescription pid Process Token: SeDebugPrivilege 1356 2.exe Token: SeDebugPrivilege 4008 1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a5e7145dc17d160b41d36dbea524c3f0.exedescription pid Process procid_target PID 4668 wrote to memory of 4008 4668 a5e7145dc17d160b41d36dbea524c3f0.exe 87 PID 4668 wrote to memory of 4008 4668 a5e7145dc17d160b41d36dbea524c3f0.exe 87 PID 4668 wrote to memory of 1356 4668 a5e7145dc17d160b41d36dbea524c3f0.exe 88 PID 4668 wrote to memory of 1356 4668 a5e7145dc17d160b41d36dbea524c3f0.exe 88 PID 4668 wrote to memory of 1356 4668 a5e7145dc17d160b41d36dbea524c3f0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e7145dc17d160b41d36dbea524c3f0.exe"C:\Users\Admin\AppData\Local\Temp\a5e7145dc17d160b41d36dbea524c3f0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 19563⤵
- Program crash
PID:4296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1356 -ip 13561⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5dd3c11b27f04d8117c742743aee371fd
SHA11565d444ad28de48c4bf0ce25b07ef4651092621
SHA2560ccd702f7d3bac8ad10a6690819e875dd7a1ba2a09e66b027f371e93a51bce49
SHA5128ac46760ed0462a0e2765999b265eb6cd196ab1d7d38676d77f3ea5061d1a794d1f5e5f0d253c55bf539838e1a2764265fa16c4712fe91eeaac435a1a0046a5c
-
Filesize
7KB
MD53947b2cc3f68a712d431b5c2a2c2ee4d
SHA1db0443ba8a6d5839e93bf59f3eed0e69c545df3b
SHA256abfcccc38dd5217e0bc9af26c9902c22450b3ac5ae203142e89164f019419262
SHA512f1d0b3279cffaa2bc121f6ac7b068416ebe3cc5824222e5a73d118e0528c3438d9f1e0d1c698dc9306a1a0eebfd78f29a3df283c6ed68e466d694b9a344d0991
-
C:\Users\Admin\AppData\Local\VuRuuwTJXFZTVDBT078BFBFF000306D21822155167\67078BFBFF000306D218221551VuRuuwTJXFZTVDBT\Browsers\Passwords\Passwords_Edge.txt
Filesize426B
MD542fa959509b3ed7c94c0cf3728b03f6d
SHA1661292176640beb0b38dc9e7a462518eb592d27d
SHA256870ef3d2370932a8938faa60abd47d75ea0af98bfa11c82ae8efe9e94fd8be00
SHA5127def291737d081c93d0cc38ac8d3062fd34d93b68d191eb0d54e9857e0c0afdbcd241471a2e10c28ce8db3b1d1ae0dba2ef6f609cfe8a1e8fe1dd103dba80007
-
C:\Users\Admin\AppData\Local\VuRuuwTJXFZTVDBT078BFBFF000306D21822155167\67078BFBFF000306D218221551VuRuuwTJXFZTVDBT\Grabber\DebugWatch.doc
Filesize903KB
MD532b5c884fe7d9f9bca4a3a9a4e7bd890
SHA1198434163f01c5726342d4eb30d260bab8f74bc9
SHA2562d409cbdeeb841c33f408c7667585fa212fc22cbf0a07483a172ad6f5f416a2c
SHA512512c910191cff5400b43ebba29ced7b53454c12b9b4e613534db6363b62968d417f72dc41205beffae831c9245a5b01a469e5e8fa7a5bbf1d02232ff2da9d057
-
C:\Users\Admin\AppData\Local\VuRuuwTJXFZTVDBT078BFBFF000306D21822155167\67078BFBFF000306D218221551VuRuuwTJXFZTVDBT\Grabber\ExportTrace.png
Filesize311KB
MD5f3fe675ac3ab3ce71a94d206ac5e1838
SHA1354739b4be62625f7bf9c2f4a5bb9a02b6c7bdca
SHA2569eb1fa01d2989f879ad81fba5fb9b5e315a24f21383e097cae8f2844421a1018
SHA512e5fe07dd8035b6fdcb907ec4af4e332186485a81666f2937c8775694d5f1c6159fd81c826b8ced87576304d7061f07dbde777b2dc4c3f67482de58c325865c4e
-
C:\Users\Admin\AppData\Local\VuRuuwTJXFZTVDBT078BFBFF000306D21822155167\67078BFBFF000306D218221551VuRuuwTJXFZTVDBT\Grabber\StartRequest.doc
Filesize357KB
MD58999afa8c0d7ea98ad450cd49c47e24c
SHA13a34d09164ca5f9ae330df0f8e3c5efe255ca881
SHA2561a1c0e293ee669267edf39424e7e181229408c72794fdaee1d2ce4ad7937db20
SHA512053e1319bd6b707f21b82cf4826b8b6104e26a83be77149a2840f937029c393a50fb0fc12b344d1d775515cdeb98ac5b46b2755064554e663940a0680ff8c4d8