Analysis

  • max time kernel
    28s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    19-10-2021 14:58

General

  • Target

    fef94d43785bb65b22223999176aee30.exe

  • Size

    66KB

  • MD5

    fef94d43785bb65b22223999176aee30

  • SHA1

    e0909b279e64aedad50e4184bff28b6e1d1f4d99

  • SHA256

    711596144e0595c7a7b4ce14657415f14a6966eadbaa4efbaea49f9cea746465

  • SHA512

    0c70fb0fee26840accae862d6fd8f1692bb283042372f889b62f3363c85f6e5d0c8e414e72a3b0a3bbaa4c06b47ba27b5235bb03ab82c5e0dc3147d29c4f6c99

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 6 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fef94d43785bb65b22223999176aee30.exe
    "C:\Users\Admin\AppData\Local\Temp\fef94d43785bb65b22223999176aee30.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Roaming\2559021.exe
      "C:\Users\Admin\AppData\Roaming\2559021.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
    • C:\Users\Admin\AppData\Roaming\1821333.exe
      "C:\Users\Admin\AppData\Roaming\1821333.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1868
    • C:\Users\Admin\AppData\Roaming\642804.exe
      "C:\Users\Admin\AppData\Roaming\642804.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
    • C:\Users\Admin\AppData\Roaming\6093698.exe
      "C:\Users\Admin\AppData\Roaming\6093698.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
        3⤵
        • Executes dropped EXE
        PID:768
    • C:\Users\Admin\AppData\Roaming\299670.exe
      "C:\Users\Admin\AppData\Roaming\299670.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    9f96400fc79a76ae309bb40992221af1

    SHA1

    3feffc571c5c785a15513a30e9527c3887fd8f32

    SHA256

    2da90a62964ef034b7d8f6e80b758a168c2823504f18152344e90eff454683d9

    SHA512

    6053e80c3fcee0246a1610994ff37d73309686c1cf2d10865a6f0d2a5669a0e9c52428b26a1c254b316ec4aee61219d106855ac8e5f96d393a884c816b210943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d8f77b85c71887f0f9d6408ea20d47ff

    SHA1

    16af95b6e2ad5fc8fbdbd77c3424deb4bca8c1d2

    SHA256

    33fa50defdd2a2055e9220d0003def7946bfa3e3404c5872601dd0738f2f2457

    SHA512

    13d71e3a2fcfe04ca869c4f7e2ca24a29d70fab5ebe75972fd01d2575c349c58f8262f380bee609aa435b613b3370a1737336f54c05b15ab592f04a076aee5a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    05f03e65c33ac7bc9c957efa47ad1f9a

    SHA1

    1515d16ce8fc489ad8b79d30c08b2e542bd5337e

    SHA256

    f227680833c2147cc8d12bc247fd05d098a88e66aa3ad648ee5f4f4863a4ef24

    SHA512

    dc3cfbe8249c56c3b785a44eddab4ee72ccb84d1b0a5035460113071606f9088d9a56ba5e1d8a18afa9447bb068438e86209e8cb67ef055be56c1172648ebbf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    7738ec166451a1a21cf96ff53dfa616b

    SHA1

    48652846da9a5076dc63b913aec8c0a8a326570b

    SHA256

    6e6386cc02d7ed04b7b8ab498de972eedea088c7a7d35ba91c03f520e593658b

    SHA512

    a3710bb84010405c7fad6b0184f132e210846a86576f951814f884aacd09d4b35daaba13d8edc25f71294fbc75cdbf8d72e8843fd5795685a9ed7adea76b1005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
    MD5

    881ac5c05a1f1d53ff42ebf7aef6f8e7

    SHA1

    e0dd34a3cb2ac6ab3544d19e8b1c87b431029a6b

    SHA256

    d24d7843869c3c7458c1029cf09ebd54be01bf4cf0180160d646c5b0ebf77708

    SHA512

    1100fe212b910f9b9bac9dc29e8e6240e8365c8f7888feb29ef02b25654288137c7717ad35e1ffbc856ec034d2e6c021f1235de7b973c989fdd9855e7c2f5e44

  • C:\Users\Admin\AppData\Roaming\1821333.exe
    MD5

    7b02c8c409875e573df30c0d6ba41f32

    SHA1

    6153e93cf304d7a01c14c3d000d7acf99869ca3c

    SHA256

    f430f969b29f02eb51dabf223bf91dea6a3bf790af55fe49d5e36073cdd342e8

    SHA512

    29f4ab0bd8b343d95aee94ec3e411fe6dde85d50d980bcbe8c0ae2aea0c9b1f6fb4822bb1622c8fe4c3fde26c9c91985e44cbaf7e8f6a15fbed60952fbfbb181

  • C:\Users\Admin\AppData\Roaming\2559021.exe
    MD5

    b000b6fab1932dd4ef495be9aff97ce6

    SHA1

    bb268db4c14470dcfa20bd57d91b30b163f34298

    SHA256

    46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422

    SHA512

    ac80bf00cdf53073af9bcbf2240a551a4e3832f8dcc2381f5d325cc73e7782823f11e3e7c31716510b0af5572f146ca756babc8b95347ddaca82937c01acd29a

  • C:\Users\Admin\AppData\Roaming\2559021.exe
    MD5

    b000b6fab1932dd4ef495be9aff97ce6

    SHA1

    bb268db4c14470dcfa20bd57d91b30b163f34298

    SHA256

    46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422

    SHA512

    ac80bf00cdf53073af9bcbf2240a551a4e3832f8dcc2381f5d325cc73e7782823f11e3e7c31716510b0af5572f146ca756babc8b95347ddaca82937c01acd29a

  • C:\Users\Admin\AppData\Roaming\299670.exe
    MD5

    bae62464dcabed11f92664a980b25a8d

    SHA1

    45d9d713c1d0415f73b224f42fa80f772f8ad434

    SHA256

    63a1722ff99b52778675943c9462258e13349469ebd0977aaf5aec471fbfb1b2

    SHA512

    f2a5fdd5fc21e4fde6e26bbb87e43171517cf214e186268f0c52341ba7e3554a64f6982ddb57731f3ebf67fd3ab4be0c3fd5135f6e52ef887df70662bc9c5f68

  • C:\Users\Admin\AppData\Roaming\299670.exe
    MD5

    bae62464dcabed11f92664a980b25a8d

    SHA1

    45d9d713c1d0415f73b224f42fa80f772f8ad434

    SHA256

    63a1722ff99b52778675943c9462258e13349469ebd0977aaf5aec471fbfb1b2

    SHA512

    f2a5fdd5fc21e4fde6e26bbb87e43171517cf214e186268f0c52341ba7e3554a64f6982ddb57731f3ebf67fd3ab4be0c3fd5135f6e52ef887df70662bc9c5f68

  • C:\Users\Admin\AppData\Roaming\6093698.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • C:\Users\Admin\AppData\Roaming\6093698.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • C:\Users\Admin\AppData\Roaming\642804.exe
    MD5

    65af30e5183ec3ed5bbd2bb01a84c70d

    SHA1

    0c80dd39c6f549d223580d0de4cac24e16bc2b4d

    SHA256

    e8dfd805239ea832e78569f203b2f097560387960395396b870ab2ab66e620d7

    SHA512

    290e6ea2f1c402a3002f58047852a3507a28910a416973b86c73ffbf62f85b7d5e3803a05a7ba66b4f167757c75908b35c275e29ed7ccb2f440ab1fcd7b91944

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • \Users\Admin\AppData\Roaming\1821333.exe
    MD5

    7b02c8c409875e573df30c0d6ba41f32

    SHA1

    6153e93cf304d7a01c14c3d000d7acf99869ca3c

    SHA256

    f430f969b29f02eb51dabf223bf91dea6a3bf790af55fe49d5e36073cdd342e8

    SHA512

    29f4ab0bd8b343d95aee94ec3e411fe6dde85d50d980bcbe8c0ae2aea0c9b1f6fb4822bb1622c8fe4c3fde26c9c91985e44cbaf7e8f6a15fbed60952fbfbb181

  • \Users\Admin\AppData\Roaming\2559021.exe
    MD5

    b000b6fab1932dd4ef495be9aff97ce6

    SHA1

    bb268db4c14470dcfa20bd57d91b30b163f34298

    SHA256

    46406f0615c1f330788c4271a32c244859e5bc4ef2d83fc1cf4484fd10454422

    SHA512

    ac80bf00cdf53073af9bcbf2240a551a4e3832f8dcc2381f5d325cc73e7782823f11e3e7c31716510b0af5572f146ca756babc8b95347ddaca82937c01acd29a

  • \Users\Admin\AppData\Roaming\299670.exe
    MD5

    bae62464dcabed11f92664a980b25a8d

    SHA1

    45d9d713c1d0415f73b224f42fa80f772f8ad434

    SHA256

    63a1722ff99b52778675943c9462258e13349469ebd0977aaf5aec471fbfb1b2

    SHA512

    f2a5fdd5fc21e4fde6e26bbb87e43171517cf214e186268f0c52341ba7e3554a64f6982ddb57731f3ebf67fd3ab4be0c3fd5135f6e52ef887df70662bc9c5f68

  • \Users\Admin\AppData\Roaming\6093698.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • \Users\Admin\AppData\Roaming\642804.exe
    MD5

    65af30e5183ec3ed5bbd2bb01a84c70d

    SHA1

    0c80dd39c6f549d223580d0de4cac24e16bc2b4d

    SHA256

    e8dfd805239ea832e78569f203b2f097560387960395396b870ab2ab66e620d7

    SHA512

    290e6ea2f1c402a3002f58047852a3507a28910a416973b86c73ffbf62f85b7d5e3803a05a7ba66b4f167757c75908b35c275e29ed7ccb2f440ab1fcd7b91944

  • \Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    9ec6ecf38cb040515dd99edc3e964c10

    SHA1

    96013003c9055983f9e9411613364d6c29169738

    SHA256

    80db68b4b0216a5371497f59d688d88108efe0bbf3d3fea1b969cde9ce8d4168

    SHA512

    1a7746ddf8f0a660fe4fa6b7fce03c922f2c027550388dd50910d2969ca6390b5b792644dcfd6562ef2ac44b74940547c6281806b30772cfa41415722f7eb323

  • memory/768-100-0x0000000000000000-mapping.dmp
  • memory/768-103-0x00000000008D0000-0x00000000008D1000-memory.dmp
    Filesize

    4KB

  • memory/768-109-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/1112-53-0x0000000000C40000-0x0000000000C41000-memory.dmp
    Filesize

    4KB

  • memory/1112-55-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB

  • memory/1112-56-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
    Filesize

    4KB

  • memory/1216-58-0x0000000000000000-mapping.dmp
  • memory/1216-61-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/1216-63-0x00000000004E0000-0x00000000004E1000-memory.dmp
    Filesize

    4KB

  • memory/1216-64-0x0000000001F90000-0x0000000001FD9000-memory.dmp
    Filesize

    292KB

  • memory/1216-66-0x00000000048F0000-0x00000000048F1000-memory.dmp
    Filesize

    4KB

  • memory/1216-65-0x0000000000500000-0x0000000000501000-memory.dmp
    Filesize

    4KB

  • memory/1628-89-0x0000000000300000-0x0000000000301000-memory.dmp
    Filesize

    4KB

  • memory/1628-80-0x0000000000000000-mapping.dmp
  • memory/1628-84-0x00000000011E0000-0x00000000011E1000-memory.dmp
    Filesize

    4KB

  • memory/1868-75-0x0000000005240000-0x0000000005241000-memory.dmp
    Filesize

    4KB

  • memory/1868-68-0x0000000000000000-mapping.dmp
  • memory/1868-70-0x00000000751A1000-0x00000000751A3000-memory.dmp
    Filesize

    8KB

  • memory/1868-73-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/1936-108-0x00000000047E0000-0x00000000047E1000-memory.dmp
    Filesize

    4KB

  • memory/1936-104-0x00000000008B0000-0x00000000008B1000-memory.dmp
    Filesize

    4KB

  • memory/1936-98-0x0000000000860000-0x00000000008A8000-memory.dmp
    Filesize

    288KB

  • memory/1936-97-0x0000000000350000-0x0000000000351000-memory.dmp
    Filesize

    4KB

  • memory/1936-95-0x00000000008D0000-0x00000000008D1000-memory.dmp
    Filesize

    4KB

  • memory/1936-87-0x0000000000000000-mapping.dmp
  • memory/1996-107-0x0000000005340000-0x0000000005341000-memory.dmp
    Filesize

    4KB

  • memory/1996-92-0x0000000001340000-0x0000000001341000-memory.dmp
    Filesize

    4KB

  • memory/1996-77-0x0000000000000000-mapping.dmp