Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
28-02-2022 05:09
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-en-20220112
General
-
Target
tmp.exe
-
Size
652KB
-
MD5
5dfc3eefe1c51312d0020910020c4025
-
SHA1
8e6ab92a5d138b3f997ee0a12bb2438e82236760
-
SHA256
7cff549b9b283c2124a963526762625ac3a476ced39bab1afb2cf1accd3249d0
-
SHA512
6be0d92564a380dff41d2960d32e17fe81c0340dbb09a1207a109fa0f584a75e066bbc3a26f5d53f4a62037fd09938a3729d2f595100c7b26bacea38e5e4a6cd
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tmp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName tmp.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total tmp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\DOMStorage\msn.com tmp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage tmp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.msn.com\ = "45" tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "45" tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\NumberOfSubdomains = "1" tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "45" tmp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.msn.com tmp.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3604 tmp.exe Token: SeIncBasePriorityPrivilege 3604 tmp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe 3604 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3604