Analysis

  • max time kernel
    9s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    13-08-2020 13:51

General

  • Target

    d4b38b75499cf83d346f4a822d0ba030.exe

  • Size

    2.3MB

  • MD5

    d4b38b75499cf83d346f4a822d0ba030

  • SHA1

    69aeec844c0a450e5f8780cf88931891a3e63088

  • SHA256

    98c7afbcedd4b065eca5ef447f3d054a65653b841acc67612dd7722143124b2c

  • SHA512

    90622ffe132c3232d1310dce75736abd51c659843a89428b11bdaa92fbfa66b82fef0e1d1f81050beaa35daf1298f3c23046c7bf2b399acc2b37c6fd8987260d

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 126 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4b38b75499cf83d346f4a822d0ba030.exe
    "C:\Users\Admin\AppData\Local\Temp\d4b38b75499cf83d346f4a822d0ba030.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
      "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"
      2⤵
      • Executes dropped EXE
      PID:3832
    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe
      "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe"
      2⤵
      • Executes dropped EXE
      PID:2080
    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper2.exe
      "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper2.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start tmp1.exe & start tmp2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp1.exe
          tmp1.exe
          4⤵
          • Executes dropped EXE
          PID:2668
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp2.exe
          tmp2.exe
          4⤵
          • Executes dropped EXE
          PID:3400
    • C:\Windows\SysWOW64\regedit.exe
      "C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg
      2⤵
      • Runs .reg file with regedit
      PID:2148
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:916
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1256
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1896
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:2168

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe

    MD5

    559a3ab04d99bb4cb745938e8ca50df7

    SHA1

    ad5e3b52aa06e70c7773f6154821a5c9fb71600b

    SHA256

    ea83340d68d0d0074a2033d733ac1c540a20a1b3695b1736a1acda0d140c2a36

    SHA512

    0fbf18d40b40c303e14b1103fa72de417f7e2651e3a0b6f6f2fc451df6f983824e7eaff300bece4f0ce6069a2a7358552b097ce8e52680899475ddf05740240a

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe

    MD5

    559a3ab04d99bb4cb745938e8ca50df7

    SHA1

    ad5e3b52aa06e70c7773f6154821a5c9fb71600b

    SHA256

    ea83340d68d0d0074a2033d733ac1c540a20a1b3695b1736a1acda0d140c2a36

    SHA512

    0fbf18d40b40c303e14b1103fa72de417f7e2651e3a0b6f6f2fc451df6f983824e7eaff300bece4f0ce6069a2a7358552b097ce8e52680899475ddf05740240a

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe

    MD5

    f88d4dfabd4f78acaa42d895f43f8828

    SHA1

    c9b36c929c99f32a9ed2470dd8855dd1745037a7

    SHA256

    140a91341c83c30263f50513c724101f9fc998604d2760198863c2eae167c0f9

    SHA512

    8ffd5d00a775bd0e4b6e4000a010786fc0ea5fbea12f972b3896fb1b9f4deda03ba00a73bfa439877698c8adc9fa1f9567c30514bd096fdde26fdda0c1fe38d3

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe

    MD5

    f88d4dfabd4f78acaa42d895f43f8828

    SHA1

    c9b36c929c99f32a9ed2470dd8855dd1745037a7

    SHA256

    140a91341c83c30263f50513c724101f9fc998604d2760198863c2eae167c0f9

    SHA512

    8ffd5d00a775bd0e4b6e4000a010786fc0ea5fbea12f972b3896fb1b9f4deda03ba00a73bfa439877698c8adc9fa1f9567c30514bd096fdde26fdda0c1fe38d3

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper2.exe

    MD5

    2b5321933427432adbfe1cfce7f08344

    SHA1

    b36505e427fe3d407b1f4e25cbc1ece657da1ea0

    SHA256

    1bde501cef6136fd7d61ae338b9bf743788012a9aad2c76f6100e2b79dd6435d

    SHA512

    da92b5a20d5a8b848f5b6f25fd4861cbea1c45e6becc63b7a037c8a0d10c94c495270f6b2fac672564820b8387e69b30c700c74e4a74f841b737f30be8152b10

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper2.exe

    MD5

    2b5321933427432adbfe1cfce7f08344

    SHA1

    b36505e427fe3d407b1f4e25cbc1ece657da1ea0

    SHA256

    1bde501cef6136fd7d61ae338b9bf743788012a9aad2c76f6100e2b79dd6435d

    SHA512

    da92b5a20d5a8b848f5b6f25fd4861cbea1c45e6becc63b7a037c8a0d10c94c495270f6b2fac672564820b8387e69b30c700c74e4a74f841b737f30be8152b10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp1.exe

    MD5

    401f633fb3b93427975f59639658404b

    SHA1

    51b5ac180fbdca5d74642fe32e0ab3d6ab8fa6b7

    SHA256

    4f28bf2f6d84e7ecb7daf9fdaf0897ae2c32337f68f9eec4a7a8b948b714c0da

    SHA512

    0708aa4bae6689b696f783afd75610319d45687f26a17517e9423529638d994dcd7217e30ff5ac4dd36700fcd3eaaac97da7524dfc7805015c60be6790486211

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp1.exe

    MD5

    401f633fb3b93427975f59639658404b

    SHA1

    51b5ac180fbdca5d74642fe32e0ab3d6ab8fa6b7

    SHA256

    4f28bf2f6d84e7ecb7daf9fdaf0897ae2c32337f68f9eec4a7a8b948b714c0da

    SHA512

    0708aa4bae6689b696f783afd75610319d45687f26a17517e9423529638d994dcd7217e30ff5ac4dd36700fcd3eaaac97da7524dfc7805015c60be6790486211

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp2.exe

    MD5

    3bad4ac424e0b6f2b4fde8205c37b5be

    SHA1

    8709ce3012f178e52716865992bdef531ba87c05

    SHA256

    238d672eddadd5d79508ea509462e3d135d1e85756d3ae3c8793ea3055cbd966

    SHA512

    bb61bbc81fa855b3c2532d3634c51b5a813ee1c2028fa7492e5619d52daa6a0396fc95e5d854ba4f8da4fac207b1f80ac77505ac957ab401958da84fe5dcab01

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tmp2.exe

    MD5

    3bad4ac424e0b6f2b4fde8205c37b5be

    SHA1

    8709ce3012f178e52716865992bdef531ba87c05

    SHA256

    238d672eddadd5d79508ea509462e3d135d1e85756d3ae3c8793ea3055cbd966

    SHA512

    bb61bbc81fa855b3c2532d3634c51b5a813ee1c2028fa7492e5619d52daa6a0396fc95e5d854ba4f8da4fac207b1f80ac77505ac957ab401958da84fe5dcab01

  • memory/2080-3-0x0000000000000000-mapping.dmp

  • memory/2148-9-0x0000000000000000-mapping.dmp

  • memory/2320-10-0x0000000000000000-mapping.dmp

  • memory/2668-11-0x0000000000000000-mapping.dmp

  • memory/2668-12-0x0000000000000000-mapping.dmp

  • memory/2668-20-0x000000006FA10000-0x00000000700FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3400-15-0x0000000000000000-mapping.dmp

  • memory/3400-16-0x0000000000000000-mapping.dmp

  • memory/3400-19-0x000000006FA10000-0x00000000700FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3832-0-0x0000000000000000-mapping.dmp

  • memory/4020-6-0x0000000000000000-mapping.dmp