Analysis

  • max time kernel
    75s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    02-02-2022 02:45

General

  • Target

    2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe

  • Size

    605KB

  • MD5

    b06ca9689a517fa053a77ebce8fab696

  • SHA1

    06691dda8b7f412ba4c31f2f78678acbc8262881

  • SHA256

    2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece

  • SHA512

    9af05fe8d4b2ecb0abcc3283af18950912cc0888bc1a98b3f9164cd839c41ddf6a2dea2c62dfcaaf8b53dac0eb8255ef6527e3f81f6908677d1ed5bce557e917

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    10203040eam.

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe
    "C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Public\Downloads\systems.exe
      "C:\Users\Public\Downloads\systems.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2188
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\Downloads\vbs.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Downloads\vbs.bat" "
        3⤵
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown -r -t 45
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2352
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad2055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Downloads\systems.exe

    MD5

    7dcef4cc1f3f2a74f8fbc0c0166a27c3

    SHA1

    a9297bdcd7627cdb9f7ad5a2611a0f1c283c272b

    SHA256

    92fe9be6bf00bc36f978665fc900082dc40e5b863c92c3070f819aeb7113ef93

    SHA512

    ac358b03013a2ebb7b18ab8adb2ce1f5fc115ea9bd6f1894e625148a206248be6f27d1dc408f014b28934fa63b5b5a80ae5bd2ac3fc85d511d6a27e4405793a3

  • C:\Users\Public\Downloads\systems.exe

    MD5

    7dcef4cc1f3f2a74f8fbc0c0166a27c3

    SHA1

    a9297bdcd7627cdb9f7ad5a2611a0f1c283c272b

    SHA256

    92fe9be6bf00bc36f978665fc900082dc40e5b863c92c3070f819aeb7113ef93

    SHA512

    ac358b03013a2ebb7b18ab8adb2ce1f5fc115ea9bd6f1894e625148a206248be6f27d1dc408f014b28934fa63b5b5a80ae5bd2ac3fc85d511d6a27e4405793a3

  • C:\Users\Public\Downloads\vbs.bat

    MD5

    ade19598f8dad9f073ae38aa05ddbe6d

    SHA1

    e354e68fec4371c2dd561aac8507bf9e70c675f9

    SHA256

    b71c40c6d22b2bf20b9b86c8a6af04097d39e58ef31dbf4e4c73636756177985

    SHA512

    59f4ec80efa5f4804645fb0ad276177afcf5b70643b47e1d483ee881347d583f1df587289cc11e9972e733b39b9458248475705c7d487c4e109575126ede4ddb

  • C:\Users\Public\Downloads\vbs.vbs

    MD5

    703060ffd10943fcc7f9c0eede5d114a

    SHA1

    5fcd96f61af1d1325a8270b229a182f38f573952

    SHA256

    309cad9f3be025cc5cc1a62d6ea6e6072bd307a9e9af4ab8ddaf7f7ed6f81e03

    SHA512

    74530da055f7c386efb98e36fc52553c1d0e3f33031af8fb87c4ded84f3475bf0c983ed044ddefee1020384020f6c848249cd1a238b97567845bcbb4a8371953

  • memory/2188-120-0x00000000007B0000-0x0000000000804000-memory.dmp

    Filesize

    336KB

  • memory/2188-122-0x00000000055B0000-0x0000000005AAE000-memory.dmp

    Filesize

    5.0MB

  • memory/2188-123-0x00000000050B0000-0x000000000514C000-memory.dmp

    Filesize

    624KB

  • memory/2188-124-0x0000000004FB0000-0x000000000504C000-memory.dmp

    Filesize

    624KB

  • memory/2188-125-0x0000000006020000-0x0000000006086000-memory.dmp

    Filesize

    408KB

  • memory/2188-126-0x00000000066F0000-0x0000000006782000-memory.dmp

    Filesize

    584KB

  • memory/2188-127-0x0000000006690000-0x000000000669A000-memory.dmp

    Filesize

    40KB