Resubmissions

07-09-2021 18:08

210907-wq7rdadba9 10

07-09-2021 17:57

210907-wjxylagcfn 10

Analysis

  • max time kernel
    403s
  • max time network
    1609s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    07-09-2021 18:08

General

  • Target

    keygen-step-4/md1_1eaf.exe

  • Size

    991KB

  • MD5

    f250a9c692088cce4253332a205b1649

  • SHA1

    109c79124ce2bda06cab50ea5d97294d13d42b20

  • SHA256

    0a6c3a23510f93fcdcb6d5acc53ccccbcc51c68f14b1bcbd758ffbf135f8e882

  • SHA512

    80553664f188ae35cef1f89d188fb17df8a490367f8d6fa5f9897115bacf776373905bccd599353add684c7fa6c2554d04cbf1a7f6cc87b299d6c51da33c1b5e

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-4\md1_1eaf.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-4\md1_1eaf.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:1416
  • C:\Windows\System32\sihclient.exe
    C:\Windows\System32\sihclient.exe /cv hT4RkUrQU0KJr6hWfqbv1w.0.2
    1⤵
    • Modifies data under HKEY_USERS
    PID:4704
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:852
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
    1⤵
      PID:960

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/852-176-0x00000248BF9B0000-0x00000248BF9B4000-memory.dmp
      Filesize

      16KB

    • memory/852-177-0x00000248C1EA0000-0x00000248C1EA4000-memory.dmp
      Filesize

      16KB

    • memory/852-178-0x00000248C1E60000-0x00000248C1E61000-memory.dmp
      Filesize

      4KB

    • memory/852-179-0x00000248BF9E0000-0x00000248BF9E4000-memory.dmp
      Filesize

      16KB

    • memory/852-180-0x00000248BF9D0000-0x00000248BF9D1000-memory.dmp
      Filesize

      4KB

    • memory/852-181-0x00000248BF9D0000-0x00000248BF9D4000-memory.dmp
      Filesize

      16KB

    • memory/852-182-0x00000248BF8B0000-0x00000248BF8B1000-memory.dmp
      Filesize

      4KB

    • memory/1416-146-0x00000000007F0000-0x00000000007F3000-memory.dmp
      Filesize

      12KB

    • memory/1416-147-0x0000000003B10000-0x0000000003B20000-memory.dmp
      Filesize

      64KB

    • memory/1416-155-0x0000000003C90000-0x0000000003CA0000-memory.dmp
      Filesize

      64KB

    • memory/1416-163-0x0000000003B10000-0x0000000003B90000-memory.dmp
      Filesize

      512KB