Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    17-03-2022 07:01

General

  • Target

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe

  • Size

    456KB

  • MD5

    0ce6472a1caf1e18f0c87c6f405c6441

  • SHA1

    d6f0f1a7cfb43cadeace56f7624e3ca91bb46b8f

  • SHA256

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b

  • SHA512

    5398f90b48a360f3ee4b8e5668f561fea209abdbdd426e58617d498257a4a204fb7a2687a771f1d907c3adee4b03511bb459ae6acec2401f6adf257a2e9be510

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe
    "C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 5 -w 5000
        3⤵
        • Runs ping.exe
        PID:2316
    • C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:4284
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" http://127.0.0.1:12603
          3⤵
          • Enumerates system info in registry
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5096
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x9c,0x104,0x7ffe778346f8,0x7ffe77834708,0x7ffe77834718
            4⤵
              PID:4528
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
              4⤵
                PID:1208
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2920 /prefetch:3
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1136
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2652,4557426887391705650,1827745112311804220,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3100 /prefetch:8
                4⤵
                  PID:2120
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:2240

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe

              Filesize

              1.5MB

              MD5

              05d3edc56331ce405e49ad2fc4e6c01e

              SHA1

              0b0491f9b654bb0bc41929456ba2943141be6711

              SHA256

              ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14

              SHA512

              b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26

            • C:\Users\Admin\AppData\Local\Temp\tmp165F.tmp.exe

              Filesize

              1.5MB

              MD5

              05d3edc56331ce405e49ad2fc4e6c01e

              SHA1

              0b0491f9b654bb0bc41929456ba2943141be6711

              SHA256

              ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14

              SHA512

              b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26

            • C:\Users\Admin\AppData\Local\Temp\x64\SQLite.Interop.dll

              Filesize

              1.6MB

              MD5

              616827a61d7a49ce5389c5d96443e35d

              SHA1

              d522ee5607e122e775d77641dba09711146db739

              SHA256

              54d4025bc175de5367d0ace1a78fec7edf06b642892691cf85afb02b8ab166d5

              SHA512

              fd6a53cb9851e56b8dc6a40627058852f2949688b73dacf6f3e0fcf932453b8c52a3bfefb12c80c38397a89f1038ad8fad329ea2798b86457ce5d8fe7ba87312

            • memory/1208-150-0x00007FFE99E20000-0x00007FFE99E21000-memory.dmp

              Filesize

              4KB

            • memory/1700-134-0x00000268D2F80000-0x00000268D2FF8000-memory.dmp

              Filesize

              480KB

            • memory/1700-135-0x00007FFE7A510000-0x00007FFE7AFD1000-memory.dmp

              Filesize

              10.8MB

            • memory/1700-136-0x00000268D3360000-0x00000268D3362000-memory.dmp

              Filesize

              8KB

            • memory/2472-140-0x00007FFE7A510000-0x00007FFE7AFD1000-memory.dmp

              Filesize

              10.8MB

            • memory/2472-143-0x000000001AE54000-0x000000001AE56000-memory.dmp

              Filesize

              8KB

            • memory/2472-144-0x000000001CB70000-0x000000001CBC0000-memory.dmp

              Filesize

              320KB

            • memory/2472-145-0x000000001CBC0000-0x000000001CBE2000-memory.dmp

              Filesize

              136KB

            • memory/2472-142-0x000000001AE52000-0x000000001AE54000-memory.dmp

              Filesize

              8KB

            • memory/2472-147-0x000000001D840000-0x000000001D87A000-memory.dmp

              Filesize

              232KB

            • memory/2472-148-0x000000001AE57000-0x000000001AE59000-memory.dmp

              Filesize

              8KB

            • memory/2472-141-0x000000001AE50000-0x000000001AE52000-memory.dmp

              Filesize

              8KB

            • memory/2472-139-0x00000000000A0000-0x0000000000226000-memory.dmp

              Filesize

              1.5MB