Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 12:46

General

  • Target

    1edf2704fcf6ca4b13ba4b06a5b2ece770a9465391e527d9bc08689ccf1b8e47.exe

  • Size

    1019KB

  • MD5

    d80731db1bbef88fef86ecdb8ed74dc3

  • SHA1

    e439a112d2cb675dc2989a5962f25a7eb4e53dd5

  • SHA256

    1edf2704fcf6ca4b13ba4b06a5b2ece770a9465391e527d9bc08689ccf1b8e47

  • SHA512

    668ea73ee65a79f8a429fe70e51524c3d7499be4eca08626e22766384034b71eb2219936c72360caa96569ec5d9dafa511534a93a26b37b2ff920199116b0323

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs
  • UAC bypass 3 TTPs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1edf2704fcf6ca4b13ba4b06a5b2ece770a9465391e527d9bc08689ccf1b8e47.exe
    "C:\Users\Admin\AppData\Local\Temp\1edf2704fcf6ca4b13ba4b06a5b2ece770a9465391e527d9bc08689ccf1b8e47.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Users\Admin\XkIcoMwc\mwkoYAkE.exe
      "C:\Users\Admin\XkIcoMwc\mwkoYAkE.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2012
    • C:\ProgramData\asgQQwUU\oGEIcwYo.exe
      "C:\ProgramData\asgQQwUU\oGEIcwYo.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1972
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\setup.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\setup.exe
        C:\Users\Admin\AppData\Local\Temp\setup.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1240
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies registry key
      PID:1264
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • Modifies registry key
      PID:868
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:608
  • C:\ProgramData\eaocIoIE\iecsUksU.exe
    C:\ProgramData\eaocIoIE\iecsUksU.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:1764

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\asgQQwUU\oGEIcwYo.exe
    MD5

    3590cfa0ef317a2e8b3e831456555edd

    SHA1

    b78659cd28aec477cb815327c0ab4238404de41e

    SHA256

    7390a28638b2c56f5759c693753f83a393a55fe522720aef606ed5d9279f96c8

    SHA512

    a0d0e6cfe603a1febdfa9553ab81f52cf5b0005acdef07c9128b9bc84445d59a545135d4bc1fffaa7fbae93679f429d31803a2c775f67f965b5287eeed44008d

  • C:\ProgramData\eaocIoIE\iecsUksU.exe
    MD5

    03a838ac6a3daf814b86d53867b8fd74

    SHA1

    271fd92ab555f9ab45a80879bccc636933dfb9b9

    SHA256

    f41cf14fd89d6da5a0a3a632ae64d391133198ed371e71a02b3639b494bf019e

    SHA512

    edab03ee9121e0ab80c4236d0d545c856e603979e718161963013cadf67c619c43558dd68f363de77734bfdcadbd642e1542d8880b251638cb101f23e71e9fde

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    MD5

    7c02f4ea3ea05524631db43cef2e0bfb

    SHA1

    f4a33008e5040faaf32ab995a11b91c16e80a46b

    SHA256

    bd38517adb5b8e86ae8543f860bda1284f0ba1c006923fbb582551e7502d908e

    SHA512

    22ba4621f66384005502ddeb117afd6b042368f9a6f537cc16037925104181679f63fe4cd9da0236ee4f741aaf181b95d29af311b762e3e18d75867c794ccec7

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    MD5

    7c02f4ea3ea05524631db43cef2e0bfb

    SHA1

    f4a33008e5040faaf32ab995a11b91c16e80a46b

    SHA256

    bd38517adb5b8e86ae8543f860bda1284f0ba1c006923fbb582551e7502d908e

    SHA512

    22ba4621f66384005502ddeb117afd6b042368f9a6f537cc16037925104181679f63fe4cd9da0236ee4f741aaf181b95d29af311b762e3e18d75867c794ccec7

  • C:\Users\Admin\XkIcoMwc\mwkoYAkE.exe
    MD5

    1b93b600bc154a546a5c0d4219b4f58a

    SHA1

    b2f4918f6c8d45acd4d691285881a93224c57609

    SHA256

    166afeb97add3f536b75db0be79157351d2c929e8710c4a43ef6b2b45bf87528

    SHA512

    c8858f722b759fd09d20047331737f821ce7009062603fbc7febb9adf3ac2d6845060cbb954219f3e44069f857221c72a4ce3f75ca5441ad0df6c4eaefaad23b

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
    MD5

    c87e561258f2f8650cef999bf643a731

    SHA1

    2c64b901284908e8ed59cf9c912f17d45b05e0af

    SHA256

    a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

    SHA512

    dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exe
    MD5

    caa6e1dcae648ce17bc57a5b7d383cc8

    SHA1

    21fd5579a3d001779e5b8b107a326393d35dff4c

    SHA256

    14ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92

    SHA512

    e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf

  • \ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exe
    MD5

    caa6e1dcae648ce17bc57a5b7d383cc8

    SHA1

    21fd5579a3d001779e5b8b107a326393d35dff4c

    SHA256

    14ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92

    SHA512

    e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf

  • \ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exe
    MD5

    caa6e1dcae648ce17bc57a5b7d383cc8

    SHA1

    21fd5579a3d001779e5b8b107a326393d35dff4c

    SHA256

    14ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92

    SHA512

    e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf

  • \ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\VC_redist.x64.exe
    MD5

    caa6e1dcae648ce17bc57a5b7d383cc8

    SHA1

    21fd5579a3d001779e5b8b107a326393d35dff4c

    SHA256

    14ad34fa255132c22b234bb4d30fe6cfd231f4947cccdcbbb94eb85e67135d92

    SHA512

    e4a63894895d20d5e455d6e8c9e81256f56f30f35bf8b385be103114d2e20885f3692bb3ec5e51d1a3073a072da5405200e5ed4a35956684bb8b515a20273ccf

  • \ProgramData\asgQQwUU\oGEIcwYo.exe
    MD5

    3590cfa0ef317a2e8b3e831456555edd

    SHA1

    b78659cd28aec477cb815327c0ab4238404de41e

    SHA256

    7390a28638b2c56f5759c693753f83a393a55fe522720aef606ed5d9279f96c8

    SHA512

    a0d0e6cfe603a1febdfa9553ab81f52cf5b0005acdef07c9128b9bc84445d59a545135d4bc1fffaa7fbae93679f429d31803a2c775f67f965b5287eeed44008d

  • \ProgramData\asgQQwUU\oGEIcwYo.exe
    MD5

    3590cfa0ef317a2e8b3e831456555edd

    SHA1

    b78659cd28aec477cb815327c0ab4238404de41e

    SHA256

    7390a28638b2c56f5759c693753f83a393a55fe522720aef606ed5d9279f96c8

    SHA512

    a0d0e6cfe603a1febdfa9553ab81f52cf5b0005acdef07c9128b9bc84445d59a545135d4bc1fffaa7fbae93679f429d31803a2c775f67f965b5287eeed44008d

  • \Users\Admin\AppData\Local\Temp\setup.exe
    MD5

    7c02f4ea3ea05524631db43cef2e0bfb

    SHA1

    f4a33008e5040faaf32ab995a11b91c16e80a46b

    SHA256

    bd38517adb5b8e86ae8543f860bda1284f0ba1c006923fbb582551e7502d908e

    SHA512

    22ba4621f66384005502ddeb117afd6b042368f9a6f537cc16037925104181679f63fe4cd9da0236ee4f741aaf181b95d29af311b762e3e18d75867c794ccec7

  • \Users\Admin\XkIcoMwc\mwkoYAkE.exe
    MD5

    1b93b600bc154a546a5c0d4219b4f58a

    SHA1

    b2f4918f6c8d45acd4d691285881a93224c57609

    SHA256

    166afeb97add3f536b75db0be79157351d2c929e8710c4a43ef6b2b45bf87528

    SHA512

    c8858f722b759fd09d20047331737f821ce7009062603fbc7febb9adf3ac2d6845060cbb954219f3e44069f857221c72a4ce3f75ca5441ad0df6c4eaefaad23b

  • \Users\Admin\XkIcoMwc\mwkoYAkE.exe
    MD5

    1b93b600bc154a546a5c0d4219b4f58a

    SHA1

    b2f4918f6c8d45acd4d691285881a93224c57609

    SHA256

    166afeb97add3f536b75db0be79157351d2c929e8710c4a43ef6b2b45bf87528

    SHA512

    c8858f722b759fd09d20047331737f821ce7009062603fbc7febb9adf3ac2d6845060cbb954219f3e44069f857221c72a4ce3f75ca5441ad0df6c4eaefaad23b

  • memory/296-59-0x00000000757E1000-0x00000000757E3000-memory.dmp
    Filesize

    8KB

  • memory/608-76-0x0000000000000000-mapping.dmp
  • memory/868-77-0x0000000000000000-mapping.dmp
  • memory/1240-78-0x0000000000000000-mapping.dmp
  • memory/1256-72-0x0000000000000000-mapping.dmp
  • memory/1264-75-0x0000000000000000-mapping.dmp
  • memory/1972-67-0x0000000000000000-mapping.dmp
  • memory/2012-62-0x0000000000000000-mapping.dmp