Analysis

  • max time kernel
    91s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-04-2021 08:16

General

  • Target

    13db34cab435d9858269c5e823f4b575.exe

  • Size

    1.2MB

  • MD5

    13db34cab435d9858269c5e823f4b575

  • SHA1

    c6e9c301d3cfaf6671490c47c1ed4eb59f343f21

  • SHA256

    63ca5cde7141ae503639f3022f4dc4a244e8b19bf320d55a9567789aa632d036

  • SHA512

    dfd36c39b35cf1aed2b76e38d4a08c41792611cf886d337d129a19c963878cc53fb7a0d71e078d2d38e61d8341a938869686f62673f080a7182020cd08c2c6a8

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13db34cab435d9858269c5e823f4b575.exe
    "C:\Users\Admin\AppData\Local\Temp\13db34cab435d9858269c5e823f4b575.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\13db34cab435d9858269c5e823f4b575.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\svclip.exe
        "C:\Users\Admin\AppData\Local\Temp\svclip.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ssWeviPUYoTiS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE8F9.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:1928
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          4⤵
            PID:3288

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1064-118-0x00000000058C0000-0x0000000005DBE000-memory.dmp

      Filesize

      5.0MB

    • memory/1064-120-0x0000000005D80000-0x0000000005D85000-memory.dmp

      Filesize

      20KB

    • memory/1064-121-0x0000000009070000-0x0000000009071000-memory.dmp

      Filesize

      4KB

    • memory/1064-122-0x00000000092C0000-0x0000000009367000-memory.dmp

      Filesize

      668KB

    • memory/1064-123-0x000000000B980000-0x000000000B9DB000-memory.dmp

      Filesize

      364KB

    • memory/1064-119-0x00000000058D0000-0x00000000058D1000-memory.dmp

      Filesize

      4KB

    • memory/1064-114-0x0000000000F70000-0x0000000000F71000-memory.dmp

      Filesize

      4KB

    • memory/1064-117-0x0000000005960000-0x0000000005961000-memory.dmp

      Filesize

      4KB

    • memory/1064-116-0x0000000005DC0000-0x0000000005DC1000-memory.dmp

      Filesize

      4KB

    • memory/1460-143-0x00000000009B0000-0x00000000009B1000-memory.dmp

      Filesize

      4KB

    • memory/1460-152-0x000000000AF30000-0x000000000AF35000-memory.dmp

      Filesize

      20KB

    • memory/1460-151-0x00000000087B0000-0x0000000008809000-memory.dmp

      Filesize

      356KB

    • memory/1460-150-0x0000000005230000-0x000000000572E000-memory.dmp

      Filesize

      5.0MB

    • memory/2192-137-0x0000000007170000-0x0000000007171000-memory.dmp

      Filesize

      4KB

    • memory/2192-134-0x0000000005880000-0x0000000005881000-memory.dmp

      Filesize

      4KB

    • memory/2192-138-0x0000000007870000-0x0000000007871000-memory.dmp

      Filesize

      4KB

    • memory/2192-130-0x0000000005570000-0x0000000005571000-memory.dmp

      Filesize

      4KB

    • memory/2192-129-0x0000000005AC0000-0x0000000005AC1000-memory.dmp

      Filesize

      4KB

    • memory/2192-131-0x00000000055D0000-0x00000000055D1000-memory.dmp

      Filesize

      4KB

    • memory/2192-139-0x00000000070C0000-0x00000000070C1000-memory.dmp

      Filesize

      4KB

    • memory/2192-133-0x00000000054B0000-0x0000000005AB6000-memory.dmp

      Filesize

      6.0MB

    • memory/2192-132-0x0000000005610000-0x0000000005611000-memory.dmp

      Filesize

      4KB

    • memory/2192-124-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3288-155-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3288-162-0x0000000005590000-0x0000000005591000-memory.dmp

      Filesize

      4KB