Analysis

  • max time kernel
    50s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-04-2021 08:16

General

  • Target

    68e2ff114060c1bfc6d2398b860e70b0.exe

  • Size

    1.3MB

  • MD5

    68e2ff114060c1bfc6d2398b860e70b0

  • SHA1

    8540e7baf664d115f9f7020ab61d73a80773d4cb

  • SHA256

    207be23ccd62d0e3d9aefe12f5c2ab142a42a25b1e246e27e0ae9087c2fe96d3

  • SHA512

    dcff2bc1df0595c1b1fbfa09a4633253d9b16ce02f9733c9982b797ff4fb7fb345219ca3780ad259ecce83ab89a5f87c861dce70dfa23ce06c9739a9861bc509

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68e2ff114060c1bfc6d2398b860e70b0.exe
    "C:\Users\Admin\AppData\Local\Temp\68e2ff114060c1bfc6d2398b860e70b0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\dllhost.exe
      "C:\Windows\System32\dllhost.exe"
      2⤵
        PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Poi.vsd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\System32\cmd.exe
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1228
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^nZwSZJdQSZwKBWJCtpbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDkGqaSrgKXZxBgABegmS$" Che.vsd
            4⤵
              PID:1260
            • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
              Agli.exe.com D
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1376
              • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
                C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com D
                5⤵
                • Executes dropped EXE
                • Drops startup file
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1684
                • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
                  C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
                  6⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious use of WriteProcessMemory
                  PID:1480
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C ver > "C:\Users\Admin\AppData\Local\Temp\chrD3C6.tmp"
                    7⤵
                      PID:892
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C wmic process get Name > "C:\Users\Admin\AppData\Local\Temp\chrD405.tmp"
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1604
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        wmic process get Name
                        8⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1980
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c makecab /V3 "C:\Users\Admin\AppData\Local\Temp\838c62b67f427b511eae39337bfbe2b5bbbedabf" "C:\Users\Admin\AppData\Local\Temp\chrD638.tmp"
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1528
                      • C:\Windows\SysWOW64\makecab.exe
                        makecab /V3 "C:\Users\Admin\AppData\Local\Temp\838c62b67f427b511eae39337bfbe2b5bbbedabf" "C:\Users\Admin\AppData\Local\Temp\chrD638.tmp"
                        8⤵
                          PID:1928
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 30
                  4⤵
                  • Runs ping.exe
                  PID:1452

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Install Root Certificate

          1
          T1130

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          System Information Discovery

          1
          T1082

          Remote System Discovery

          1
          T1018

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\838c62b67f427b511eae39337bfbe2b5bbbedabf
            MD5

            82fb8da8b9857b3554c70d136250f077

            SHA1

            3906657657bd8f450ffc597148517d5f391ccb66

            SHA256

            763ca6d9a3f6f7d57c30ae68e242d9be73c0bed2c03a3df1e5536e50d6fb9237

            SHA512

            1236f9d744d573478916f424d631526005e104d35d59bbcb8f35606dd0e8c9090320683c0faa4df16c829bff0f7df966e6415e00cd0dc0cde284868b9528f391

          • C:\Users\Admin\AppData\Local\Temp\chrD3C6.tmp
            MD5

            082f2e97e670228e3b323c6a3a874f40

            SHA1

            e50760edb5e88385449a44818f5726e5beed7aab

            SHA256

            292bf366a534157e5414f344218c9df828e2f211617fc84352f3ab2564050941

            SHA512

            ad96826fb4a9ad5296acf1136bd81348492b4e191ba7936fe515a254f7bb789ab7bb3b939a5b9094b0fdaca9b4ad0f0445034a6eb2d78bd1529c2e638eafbe91

          • C:\Users\Admin\AppData\Local\Temp\chrD405.tmp
            MD5

            24187d66c17150da175c8c0986f9764d

            SHA1

            1a19f1ba7ef659e6132e54951de5f1425b7c9877

            SHA256

            b6baa513359efd4d50336e5ff2f78ce6c3a53f6509dc5970492f3ec58643075a

            SHA512

            8ac9957329f954617ea9c3b5c03a75541906c3c346fa38833bea8f98ffd0afbcefe60ffe1c01d46e42b5a6fba484e0b8fc26fee1c5a3d36c1f37f4c73346c4da

          • C:\Users\Admin\AppData\Local\Temp\chrD638.tmp
            MD5

            7b2ff676ff705efeb88d2352af161936

            SHA1

            93fe48e74f9281ea6be6d62f9b57bc18674c7e70

            SHA256

            20f2724e3eafbc23b3776ae52d24bc1691fba060eee15ec2030324fb1b6875f3

            SHA512

            557d5941bccfb4dd3d8b50bf22a514bf6778f8e912e721564a643011a5a302ad585ff250b6180812378210fe9c5d7b87341b9d219bd55af1b2b773bdeb9270ad

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
            MD5

            78ba0653a340bac5ff152b21a83626cc

            SHA1

            b12da9cb5d024555405040e65ad89d16ae749502

            SHA256

            05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

            SHA512

            efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
            MD5

            78ba0653a340bac5ff152b21a83626cc

            SHA1

            b12da9cb5d024555405040e65ad89d16ae749502

            SHA256

            05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

            SHA512

            efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
            MD5

            78ba0653a340bac5ff152b21a83626cc

            SHA1

            b12da9cb5d024555405040e65ad89d16ae749502

            SHA256

            05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

            SHA512

            efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
            MD5

            78ba0653a340bac5ff152b21a83626cc

            SHA1

            b12da9cb5d024555405040e65ad89d16ae749502

            SHA256

            05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

            SHA512

            efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Benvenuta.vsd
            MD5

            6ca6d46f3fba9e7f22f6489f155ffb64

            SHA1

            a1d0d6373ff6df021f0da93d2fbd8d0270f1f2e0

            SHA256

            8aad09d17ec0d9f2929e88f898f3ad5b4e2c7f8d1fa39ba39ca03e665e87b674

            SHA512

            33ea4f4158fd339980134e9fc9c53ec9b9ede6a373c4c8a6111cdce3d7241cad69a02fbc207fc38a56d0536d9966db8b6eccce3f0e27e1a02f85106603376ddf

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Che.vsd
            MD5

            a7ddd4d4067d7e404d579ae32dc91542

            SHA1

            4203587509050293e0d1c8f833545230bb3355b0

            SHA256

            548e87e6b13cdda866ccc0a125b4eeab7879c2ae0fcac20073ac953d2f682729

            SHA512

            1801871bfec0c7beb62b37b4bdaee8733b9204594e4481647efc476b819c8be06fd1f2e88d99f8c62ca9c86bf91f2270c5c01e0950c160364f3f78171208b1f9

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\D
            MD5

            6ca6d46f3fba9e7f22f6489f155ffb64

            SHA1

            a1d0d6373ff6df021f0da93d2fbd8d0270f1f2e0

            SHA256

            8aad09d17ec0d9f2929e88f898f3ad5b4e2c7f8d1fa39ba39ca03e665e87b674

            SHA512

            33ea4f4158fd339980134e9fc9c53ec9b9ede6a373c4c8a6111cdce3d7241cad69a02fbc207fc38a56d0536d9966db8b6eccce3f0e27e1a02f85106603376ddf

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Poi.vsd
            MD5

            1cc05843eb402695e2aea3de852b754f

            SHA1

            14035ca106ac2c8877e3084571a894dbb2abc75f

            SHA256

            979d3f1dc9417d0c462941af909aaf41e12d3d75ba1053e452402887273d10da

            SHA512

            f027ce99450df436c7ef552ad2db27b376e864add4935a34bc8a97c4e262edbc9fa416f1ff3857829d340eff0dcb166e6eed84d21307e5e8df05866e12ecf5bb

          • C:\Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Veduto.vsd
            MD5

            b4b043fbda464d018ef01cea7cee7303

            SHA1

            2b21f85669e9ee021a0805a1d802760993f86957

            SHA256

            63bc2ca795da615cdfe6a0dcd3d65944632fe0013d452cafc3016165a762bf2a

            SHA512

            bf6af2fa5a1fd5d22c5f142c86fb167d9c849f3a294464375920eea19cb1dd5068628c846b63b364e00bc1504eddef32fb6bbe1c1bef7131248f8e291223a29e

          • \Users\Admin\AppData\Roaming\mbxeFARwrUfNuQPTuPG\Agli.exe.com
            MD5

            78ba0653a340bac5ff152b21a83626cc

            SHA1

            b12da9cb5d024555405040e65ad89d16ae749502

            SHA256

            05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

            SHA512

            efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

          • memory/892-83-0x0000000000000000-mapping.dmp
          • memory/1200-61-0x0000000000000000-mapping.dmp
          • memory/1228-63-0x0000000000000000-mapping.dmp
          • memory/1260-64-0x0000000000000000-mapping.dmp
          • memory/1376-68-0x0000000000000000-mapping.dmp
          • memory/1452-70-0x0000000000000000-mapping.dmp
          • memory/1480-79-0x0000000000900000-0x0000000001A57000-memory.dmp
            Filesize

            17.3MB

          • memory/1480-82-0x0000000000900000-0x0000000001A57000-memory.dmp
            Filesize

            17.3MB

          • memory/1528-88-0x0000000000000000-mapping.dmp
          • memory/1604-85-0x0000000000000000-mapping.dmp
          • memory/1684-73-0x0000000000000000-mapping.dmp
          • memory/1684-78-0x0000000000250000-0x0000000000251000-memory.dmp
            Filesize

            4KB

          • memory/1784-59-0x00000000760D1000-0x00000000760D3000-memory.dmp
            Filesize

            8KB

          • memory/1928-89-0x0000000000000000-mapping.dmp
          • memory/1980-86-0x0000000000000000-mapping.dmp
          • memory/2044-60-0x0000000000000000-mapping.dmp