Resubmissions

03-05-2022 12:57

220503-p7a1eaheaj 8

21-04-2022 08:13

220421-j4eljaacfn 8

Analysis

  • max time kernel
    103s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-04-2022 08:13

General

  • Target

    ae6a68f651c30d7c6c914114fa14aa0b.exe

  • Size

    967KB

  • MD5

    ae6a68f651c30d7c6c914114fa14aa0b

  • SHA1

    21eeaeb2061461f7bdd20f02542c18cc4ea75baa

  • SHA256

    f93628943add0691bc80e1db3cee114133ef839e820f50448b3082c46113cb6d

  • SHA512

    e06c62be260746076290d404f90e797d340db014b250d1c78bf05fc33fd469e051d9092df59f7668673cdd7a6a7df47ab5977b241b66da3ad20528c6266ddef9

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks processor information in registry 2 TTPs 44 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe
    "C:\Users\Admin\AppData\Local\Temp\ae6a68f651c30d7c6c914114fa14aa0b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:2844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 392
      2⤵
      • Program crash
      PID:928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 896
      2⤵
      • Program crash
      PID:1664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 896
      2⤵
      • Program crash
      PID:5004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 928
      2⤵
      • Program crash
      PID:2408
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • outlook_office_path
      • outlook_win_path
      PID:2360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4228 -ip 4228
    1⤵
      PID:2916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4228 -ip 4228
      1⤵
        PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4228 -ip 4228
        1⤵
          PID:4544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4228 -ip 4228
          1⤵
            PID:2612

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Eywuirfqiefeida.tmp

            Filesize

            3.1MB

            MD5

            1bdfa06bc0a483e11b7f79c7d2bf159b

            SHA1

            3374ea3c8f4160fb391180cef479f5592e148ecb

            SHA256

            cca21a2f2cd35d0cf026ccf5fe94801bb7b8332f37a55b9f293a2d0edfdb4862

            SHA512

            002fea0d87b0a37fde348e96ce9b1d838bd9cc327a910e491bba51c33fde56b4a67ebeb6bcec2e3e6535e0a65f24119c67119e002335373d6d2d4abde02ccf67

          • memory/2360-174-0x0000000003560000-0x0000000003FC4000-memory.dmp

            Filesize

            10.4MB

          • memory/2360-173-0x0000000003FD0000-0x0000000004110000-memory.dmp

            Filesize

            1.2MB

          • memory/2360-168-0x0000000004610000-0x0000000004611000-memory.dmp

            Filesize

            4KB

          • memory/2360-169-0x0000000003560000-0x0000000003FC4000-memory.dmp

            Filesize

            10.4MB

          • memory/2360-170-0x0000000001C00000-0x0000000001C01000-memory.dmp

            Filesize

            4KB

          • memory/2360-172-0x0000000001000000-0x0000000001944000-memory.dmp

            Filesize

            9.3MB

          • memory/2360-171-0x0000000003FD0000-0x0000000004110000-memory.dmp

            Filesize

            1.2MB

          • memory/2844-142-0x0000000000460000-0x0000000000462000-memory.dmp

            Filesize

            8KB

          • memory/2844-145-0x0000000000490000-0x0000000000492000-memory.dmp

            Filesize

            8KB

          • memory/2844-141-0x0000000000450000-0x0000000000452000-memory.dmp

            Filesize

            8KB

          • memory/2844-138-0x0000000000420000-0x0000000000422000-memory.dmp

            Filesize

            8KB

          • memory/2844-143-0x0000000000470000-0x0000000000472000-memory.dmp

            Filesize

            8KB

          • memory/2844-144-0x0000000000480000-0x0000000000482000-memory.dmp

            Filesize

            8KB

          • memory/2844-146-0x00000000004A0000-0x00000000004A2000-memory.dmp

            Filesize

            8KB

          • memory/2844-140-0x0000000000440000-0x0000000000442000-memory.dmp

            Filesize

            8KB

          • memory/2844-147-0x00000000004B0000-0x00000000004B2000-memory.dmp

            Filesize

            8KB

          • memory/2844-148-0x00000000004C0000-0x00000000004C2000-memory.dmp

            Filesize

            8KB

          • memory/2844-139-0x0000000000430000-0x0000000000432000-memory.dmp

            Filesize

            8KB

          • memory/2844-137-0x0000000000410000-0x0000000000412000-memory.dmp

            Filesize

            8KB

          • memory/2844-136-0x0000000000400000-0x0000000000402000-memory.dmp

            Filesize

            8KB

          • memory/2844-135-0x00000000001F0000-0x00000000001F2000-memory.dmp

            Filesize

            8KB

          • memory/2844-134-0x00000000001E0000-0x00000000001E2000-memory.dmp

            Filesize

            8KB

          • memory/4228-152-0x0000000003BC0000-0x0000000003BC1000-memory.dmp

            Filesize

            4KB

          • memory/4228-156-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-157-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

            Filesize

            4KB

          • memory/4228-158-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-159-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-160-0x0000000003CF0000-0x0000000003CF1000-memory.dmp

            Filesize

            4KB

          • memory/4228-161-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-162-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-165-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-164-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-155-0x0000000003A00000-0x0000000003B40000-memory.dmp

            Filesize

            1.2MB

          • memory/4228-163-0x00000000040C0000-0x00000000040C1000-memory.dmp

            Filesize

            4KB

          • memory/4228-154-0x0000000002DB0000-0x0000000002DB1000-memory.dmp

            Filesize

            4KB

          • memory/4228-153-0x0000000002DD0000-0x0000000003834000-memory.dmp

            Filesize

            10.4MB

          • memory/4228-131-0x00000000023E0000-0x00000000025C5000-memory.dmp

            Filesize

            1.9MB

          • memory/4228-151-0x0000000002DD0000-0x0000000003834000-memory.dmp

            Filesize

            10.4MB

          • memory/4228-150-0x0000000002DD0000-0x0000000003834000-memory.dmp

            Filesize

            10.4MB

          • memory/4228-130-0x0000000002311000-0x00000000023D6000-memory.dmp

            Filesize

            788KB

          • memory/4228-132-0x0000000000400000-0x00000000005F1000-memory.dmp

            Filesize

            1.9MB