Analysis

  • max time kernel
    144s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    14-04-2022 13:42

General

  • Target

    b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07.exe

  • Size

    891KB

  • MD5

    279794744b9f022ebe655c791a8e1578

  • SHA1

    e45225509f5cafa7add2b6702840fc356a422ba0

  • SHA256

    b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07

  • SHA512

    ad5091feee766f15a49de75dad3c74dced10b8c7e3d574e16a04f815939feb20e058fe4e8ee51733f172d75d83939d0499999d3a69ddb430dc4abbf26b702e4b

Score
10/10

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07.exe
    "C:\Users\Admin\AppData\Local\Temp\b709fac7630fa728c21d189818663b2c1459f8881f8674c06dbe300d437b9b07.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NKkBqEEi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA8D3.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3132
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "{path}"
      2⤵
        PID:60
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "{path}"
        2⤵
          PID:2508
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "{path}"
          2⤵
            PID:3776
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "{path}"
            2⤵
              PID:3856
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              "{path}"
              2⤵
                PID:1360

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmpA8D3.tmp

              Filesize

              1KB

              MD5

              308046fdea0734b40f4af99f9f12aeea

              SHA1

              743293e506c3fc26e5cb9520182f4dbb7849a103

              SHA256

              2bd288d701c5e93437c2a1e4a16b63cb6cbb8b05bb340bc793d6d77e70d01d79

              SHA512

              fecd736c89bea0cc891d3bd9f9a3c4204adc3002096b009c642f78337a7b48dcbcc71d2c3097f48d21694354c8a0413344863f7d77827b14f2b637e61acde730

            • memory/4200-129-0x00000000084C0000-0x000000000855C000-memory.dmp

              Filesize

              624KB

            • memory/4200-124-0x0000000000930000-0x0000000000A16000-memory.dmp

              Filesize

              920KB

            • memory/4200-128-0x0000000007E10000-0x000000000833C000-memory.dmp

              Filesize

              5.2MB

            • memory/4200-127-0x00000000053E0000-0x00000000053EA000-memory.dmp

              Filesize

              40KB

            • memory/4200-126-0x00000000053F0000-0x0000000005482000-memory.dmp

              Filesize

              584KB

            • memory/4200-125-0x00000000058C0000-0x0000000005E64000-memory.dmp

              Filesize

              5.6MB