Analysis

  • max time kernel
    67s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 02:16

General

  • Target

    Filmora9.exe

  • Size

    750.4MB

  • MD5

    bea9a069887845ffa2db931d401b5fb0

  • SHA1

    78a3e909749d816c6996caa3bba1ed71714d20d3

  • SHA256

    0384cdd9a194aef83de6cb5ab31157ff5b8d4293642539d93d5b4c4c3a96d7a5

  • SHA512

    dcc70eee65c6af4fe0fe6ab34c1af2790470c4d7d3048a6b48e50ba06033d42d15bbb97528ab5947b8ff293b852e372c387915dc63e1178e389563a6f56f2ff0

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Filmora9.exe
    "C:\Users\Admin\AppData\Local\Temp\Filmora9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Windows\SysWOW64\cmd.exe
      /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\Filmora9.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 3
        3⤵
        • Delays execution with timeout.exe
        PID:184

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/184-3-0x0000000000000000-mapping.dmp
  • memory/3164-2-0x0000000000000000-mapping.dmp