Analysis

  • max time kernel
    65s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 23:24

General

  • Target

    dubi.exew.exe

  • Size

    740KB

  • MD5

    2301df3722a9635294c12b9208f5a155

  • SHA1

    fb70e885511d04c3bd07e20d5adb24c70a92f440

  • SHA256

    5867305033836997a9a7a9e61ae8a6c1eb60ae37a490a3dc86c643a67dc3ef58

  • SHA512

    1ce4138c98ea55fb4a024ebe8214b6f620f9995a85b9582df187c3c4781661b85ed36c32f9e8a50623944e5bf8531a5771c985d29add4eb906dac08f8ae45048

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dubi.exew.exe
    "C:\Users\Admin\AppData\Local\Temp\dubi.exew.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\f77daaf7-41d2-4af5-98a8-6c01d80e14b4" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1036
    • C:\Users\Admin\AppData\Local\Temp\dubi.exew.exe
      "C:\Users\Admin\AppData\Local\Temp\dubi.exew.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\updatewin.exe
        "C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\updatewin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\Windows\SysWOW64\cmd.exe
          /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\updatewin.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 3
            5⤵
            • Delays execution with timeout.exe
            PID:3236
      • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\5.exe
        "C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\5.exe"
        3⤵
        • Executes dropped EXE
        PID:420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 1436
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    4c9af35a7edd6351ed1b0369aa5fdaad

    SHA1

    a31deacfdba98949799105169f460234a356d1b6

    SHA256

    272b1eae7ab0152427b63c9f44b954394ce8e69b39e60f4d768b00b1d6365d6c

    SHA512

    928cc4be39b1dca84af72b09067b1553ce04cac8020aba3e2f37023fb396a792ddacde4d68121d4736311aa8dd761fcc161f52224d243ae68cd6d5f6fe8a038d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    a4f1a3227ff7283cc8dd2f9e68025e12

    SHA1

    67c2de733b15f65c5157a6d495534ebdd00311c2

    SHA256

    f0e3107fe54fa10875ee7b53675713b6835c31e21d4f2c6c00880fa1b7166982

    SHA512

    3d66e1cc35685bb0ceac80e368b0743582046f3d3a6566486aeb4f956473f17dde1ef1dbd6a584ef2492e6bf0555068e0d672fa34194a6b9f37a19134670f10e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    1e6addf961f8b25bd0482b2ee7f12ead

    SHA1

    ef427a1b97e3ce6e6b9afc0e335bfceba7125b52

    SHA256

    a9a04d2b03b5a5957e9b1a54ad06fc67b56678b9de9eb5e8ee1ee340e3705984

    SHA512

    bab72ffa3bc308eaef4568f72d11df6572b871127c718b9d3a3da1a95b06e6e48f6a662024b723d3ffee0ca17a26786fbac432a72492b07b1db471d73961a0a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    107416f2bdcebc0464cf542c2fb021ea

    SHA1

    f525a251435f8c4cb2f8e4fba56592cbc2542478

    SHA256

    087a71cba4ebede2372e602a5954748b093933fa33e04ef357e619a8c6dde9e7

    SHA512

    889ca98246a64965ea60360bb834d35fb1d69731ed844db4ad467741b4eb8d8b26bd7d4a1c15108b66a9865b0e1a4371a1e37dd570f0a04192b57940ed70148e

  • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\5.exe

    MD5

    6a50d5e91b193be284aa02106ee35e97

    SHA1

    097137cb64eb18ce55c13f1e841d5312d07fbbf4

    SHA256

    82c1ccbd7db7615a982f7b8072784575972aff3f0ab4597efda9d2e7ca17b961

    SHA512

    7f79ef4c3b2cd32e6e1fe6c64d1a693115789665f705144cb912500f25f669f28ac61f709d29057b66bf2a6c1f8376b3a8ef7ccb95668cabf2d15455745f1f03

  • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\5.exe

    MD5

    6a50d5e91b193be284aa02106ee35e97

    SHA1

    097137cb64eb18ce55c13f1e841d5312d07fbbf4

    SHA256

    82c1ccbd7db7615a982f7b8072784575972aff3f0ab4597efda9d2e7ca17b961

    SHA512

    7f79ef4c3b2cd32e6e1fe6c64d1a693115789665f705144cb912500f25f669f28ac61f709d29057b66bf2a6c1f8376b3a8ef7ccb95668cabf2d15455745f1f03

  • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\updatewin.exe

    MD5

    9010fa92cc83afe00fab38703e6ffa77

    SHA1

    4d603ec27d02d84a65d1555c2df0896d7675fafc

    SHA256

    38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

    SHA512

    a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

  • C:\Users\Admin\AppData\Local\bc261e48-32db-4ba7-ab25-23b6a5df27e4\updatewin.exe

    MD5

    9010fa92cc83afe00fab38703e6ffa77

    SHA1

    4d603ec27d02d84a65d1555c2df0896d7675fafc

    SHA256

    38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

    SHA512

    a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

  • C:\Users\Admin\AppData\Local\f77daaf7-41d2-4af5-98a8-6c01d80e14b4\dubi.exew.exe

    MD5

    2301df3722a9635294c12b9208f5a155

    SHA1

    fb70e885511d04c3bd07e20d5adb24c70a92f440

    SHA256

    5867305033836997a9a7a9e61ae8a6c1eb60ae37a490a3dc86c643a67dc3ef58

    SHA512

    1ce4138c98ea55fb4a024ebe8214b6f620f9995a85b9582df187c3c4781661b85ed36c32f9e8a50623944e5bf8531a5771c985d29add4eb906dac08f8ae45048

  • memory/208-21-0x0000000004D50000-0x0000000004D51000-memory.dmp

    Filesize

    4KB

  • memory/420-18-0x0000000000000000-mapping.dmp

  • memory/1036-3-0x0000000000000000-mapping.dmp

  • memory/1108-2-0x0000000003420000-0x0000000003421000-memory.dmp

    Filesize

    4KB

  • memory/1108-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1108-4-0x0000000003220000-0x000000000333A000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-22-0x0000000000000000-mapping.dmp

  • memory/3236-23-0x0000000000000000-mapping.dmp

  • memory/3616-14-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3616-8-0x00000000031A0000-0x00000000031A1000-memory.dmp

    Filesize

    4KB

  • memory/3616-7-0x0000000000000000-mapping.dmp

  • memory/3996-15-0x0000000000000000-mapping.dmp