977e58eeed2abd4a02e40be131d88b5b

General
Target

977e58eeed2abd4a02e40be131d88b5b.exe

Filesize

457KB

Completed

22-07-2021 08:47

Score
8 /10
MD5

977e58eeed2abd4a02e40be131d88b5b

SHA1

0f15fb8159919b246fa1d9ade78043cc6459721a

SHA256

d2bab01fe3f3615831a146acbe0b099deb680545132eb28a0f1e42e37aa3870b

Malware Config
Signatures 9

Filter: none

Collection
Credential Access
Defense Evasion
Discovery
  • Downloads MZ/PE file
  • Deletes itself
    cmd.exe

    Reported IOCs

    pidprocess
    1432cmd.exe
  • Loads dropped DLL
    977e58eeed2abd4a02e40be131d88b5b.exe

    Reported IOCs

    pidprocess
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
    320977e58eeed2abd4a02e40be131d88b5b.exe
  • Reads user/profile data of local email clients

    Description

    Email clients store some user data on disk where infostealers will often target it.

    TTPs

    Data from Local SystemCredentials in Files
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Delays execution with timeout.exe
    timeout.exe

    Tags

    Reported IOCs

    pidprocess
    1240timeout.exe
  • Modifies system certificate store
    977e58eeed2abd4a02e40be131d88b5b.exe

    TTPs

    Install Root CertificateModify Registry

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13977e58eeed2abd4a02e40be131d88b5b.exe
    Set value (data)\REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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.exe
  • Suspicious use of WriteProcessMemory
    977e58eeed2abd4a02e40be131d88b5b.execmd.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 320 wrote to memory of 1432320977e58eeed2abd4a02e40be131d88b5b.execmd.exe
    PID 320 wrote to memory of 1432320977e58eeed2abd4a02e40be131d88b5b.execmd.exe
    PID 320 wrote to memory of 1432320977e58eeed2abd4a02e40be131d88b5b.execmd.exe
    PID 320 wrote to memory of 1432320977e58eeed2abd4a02e40be131d88b5b.execmd.exe
    PID 1432 wrote to memory of 12401432cmd.exetimeout.exe
    PID 1432 wrote to memory of 12401432cmd.exetimeout.exe
    PID 1432 wrote to memory of 12401432cmd.exetimeout.exe
    PID 1432 wrote to memory of 12401432cmd.exetimeout.exe
Processes 3
  • C:\Users\Admin\AppData\Local\Temp\977e58eeed2abd4a02e40be131d88b5b.exe
    "C:\Users\Admin\AppData\Local\Temp\977e58eeed2abd4a02e40be131d88b5b.exe"
    Loads dropped DLL
    Modifies system certificate store
    Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\977e58eeed2abd4a02e40be131d88b5b.exe"
      Deletes itself
      Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 10 /NOBREAK
        Delays execution with timeout.exe
        PID:1240
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Discovery
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Persistence
                Privilege Escalation
                  Replay Monitor
                  00:00 00:00
                  Downloads
                  • \Users\Admin\AppData\LocalLow\sqlite3.dll

                    MD5

                    f964811b68f9f1487c2b41e1aef576ce

                    SHA1

                    b423959793f14b1416bc3b7051bed58a1034025f

                    SHA256

                    83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                    SHA512

                    565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\freebl3.dll

                    MD5

                    60acd24430204ad2dc7f148b8cfe9bdc

                    SHA1

                    989f377b9117d7cb21cbe92a4117f88f9c7693d9

                    SHA256

                    9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                    SHA512

                    626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\mozglue.dll

                    MD5

                    eae9273f8cdcf9321c6c37c244773139

                    SHA1

                    8378e2a2f3635574c106eea8419b5eb00b8489b0

                    SHA256

                    a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                    SHA512

                    06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\msvcp140.dll

                    MD5

                    109f0f02fd37c84bfc7508d4227d7ed5

                    SHA1

                    ef7420141bb15ac334d3964082361a460bfdb975

                    SHA256

                    334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                    SHA512

                    46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\nss3.dll

                    MD5

                    02cc7b8ee30056d5912de54f1bdfc219

                    SHA1

                    a6923da95705fb81e368ae48f93d28522ef552fb

                    SHA256

                    1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                    SHA512

                    0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\softokn3.dll

                    MD5

                    4e8df049f3459fa94ab6ad387f3561ac

                    SHA1

                    06ed392bc29ad9d5fc05ee254c2625fd65925114

                    SHA256

                    25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                    SHA512

                    3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                  • \Users\Admin\AppData\LocalLow\wG3cB0qZ3rM5x\vcruntime140.dll

                    MD5

                    7587bf9cb4147022cd5681b015183046

                    SHA1

                    f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                    SHA256

                    c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                    SHA512

                    0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                  • memory/320-59-0x0000000075051000-0x0000000075053000-memory.dmp

                  • memory/320-60-0x0000000004350000-0x00000000043E3000-memory.dmp

                  • memory/320-61-0x0000000000400000-0x0000000002BB6000-memory.dmp

                  • memory/1240-70-0x0000000000000000-mapping.dmp

                  • memory/1432-69-0x0000000000000000-mapping.dmp