Analysis

  • max time kernel
    163s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-05-2022 23:08

General

  • Target

    25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe

  • Size

    888KB

  • MD5

    02e1fc62335f482e4c2bd663e206736a

  • SHA1

    83c2a8c79f0745f977dab0ae1c158292217f94d0

  • SHA256

    25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407

  • SHA512

    18ba896dc20d86c7e78dc44365391a17457b39b3ec424f99df4f72a5ec536ab7f1fa222f036c0ddb8cda89e5d36bcac73c4325f75c9b0e0a7f079e20e5d8fc8b

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe
    "C:\Users\Admin\AppData\Local\Temp\25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\cacls.exe
      C:\Windows\System32\cacls.exe C:\Windows\System32\GroupPolicy /t /e /g Everyone:f
      2⤵
        PID:1184
      • C:\Windows\SysWOW64\cacls.exe
        C:\Windows\System32\cacls.exe C:\Windows\System32\GroupPolicy /t /e /g все:f
        2⤵
          PID:1808
        • C:\Windows\SysWOW64\takeown.exe
          C:\Windows\System32\takeown.exe /F C:\Windows\System32\GroupPolicy
          2⤵
          • Modifies file permissions
          PID:776
        • C:\Windows\SysWOW64\cacls.exe
          C:\Windows\System32\cacls.exe C:\Windows\SysWOW64\GroupPolicy /t /e /g Everyone:f
          2⤵
            PID:1368
          • C:\Windows\SysWOW64\cacls.exe
            C:\Windows\System32\cacls.exe C:\Windows\SysWOW64\GroupPolicy /t /e /g все:f
            2⤵
              PID:1400
            • C:\Windows\SysWOW64\takeown.exe
              C:\Windows\System32\takeown.exe /F C:\Windows\SysWOW64\GroupPolicy
              2⤵
              • Modifies file permissions
              PID:1152
            • C:\Windows\SysWOW64\cacls.exe
              C:\Windows\System32\cacls.exe C:\Windows\Sysnative\GroupPolicy /t /e /g Everyone:f
              2⤵
                PID:1744
              • C:\Windows\SysWOW64\cacls.exe
                C:\Windows\System32\cacls.exe C:\Windows\Sysnative\GroupPolicy /t /e /g все:f
                2⤵
                  PID:784
                • C:\Windows\SysWOW64\takeown.exe
                  C:\Windows\System32\takeown.exe /F C:\Windows\Sysnative\GroupPolicy
                  2⤵
                  • Modifies file permissions
                  PID:1868
                • C:\Windows\SysWOW64\gpupdate.exe
                  C:\Windows\System32\gpupdate.exe /force
                  2⤵
                    PID:1500
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" /silent /codebase "C:\Users\Admin\AppData\Roaming\Founder Systems\ie2.dll"
                    2⤵
                    • Loads dropped DLL
                    • Modifies registry class
                    PID:1332
                • C:\Windows\system32\gpscript.exe
                  gpscript.exe /RefreshSystemParam
                  1⤵
                    PID:1892

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Browser Extensions

                  1
                  T1176

                  Defense Evasion

                  File Permissions Modification

                  1
                  T1222

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Founder Systems\ie2.dll
                    Filesize

                    13KB

                    MD5

                    80f37b86aa4d710bd6c2d02ef144c018

                    SHA1

                    1b2b9c3bbc656c61b583301bb0f67b6aa5013cf2

                    SHA256

                    05bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e

                    SHA512

                    8ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b

                  • C:\Windows\SysWOW64\GroupPolicy\User\Registry.pol
                    Filesize

                    472B

                    MD5

                    62ce4006ac00215377752dfaf25e20ae

                    SHA1

                    7e5b3b70613aa4dc1e71431e0855a47c7ee75cd2

                    SHA256

                    1bb0208258be631a21cfed8166a49ee9467dfba8962a2f85361ce365e48f6962

                    SHA512

                    d79b826cd909ec15128bfe898064854ca043171db3e55b961e0a55754567da62bc57eb9cc2a994b2e0c14b3be49707aff080df886d303de229643da47acbdaeb

                  • C:\Windows\SysWOW64\GroupPolicy\gpt.ini
                    Filesize

                    155B

                    MD5

                    b18af26ec9d74dd4bfd14fd79a655c1d

                    SHA1

                    df4c28816bc845a34d434347c10c6d14fcafdd01

                    SHA256

                    ea62b60ea16af53841f2088458910586186bd3130d6dad443a27906f7baee7c9

                    SHA512

                    bc64d120a55e93a17e81349a5a9856556612a44673ae9ae8589a66638e25685b9b70608ce23b19e0919797b04da40dbca5cdc87c7f6eb1bfb93307dc4bc74ff2

                  • \Users\Admin\AppData\Roaming\Founder Systems\ie2.dll
                    Filesize

                    13KB

                    MD5

                    80f37b86aa4d710bd6c2d02ef144c018

                    SHA1

                    1b2b9c3bbc656c61b583301bb0f67b6aa5013cf2

                    SHA256

                    05bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e

                    SHA512

                    8ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b

                  • \Users\Admin\AppData\Roaming\Founder Systems\ie2.dll
                    Filesize

                    13KB

                    MD5

                    80f37b86aa4d710bd6c2d02ef144c018

                    SHA1

                    1b2b9c3bbc656c61b583301bb0f67b6aa5013cf2

                    SHA256

                    05bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e

                    SHA512

                    8ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b

                  • \Users\Admin\AppData\Roaming\Founder Systems\ie2.dll
                    Filesize

                    13KB

                    MD5

                    80f37b86aa4d710bd6c2d02ef144c018

                    SHA1

                    1b2b9c3bbc656c61b583301bb0f67b6aa5013cf2

                    SHA256

                    05bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e

                    SHA512

                    8ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b

                  • \Users\Admin\AppData\Roaming\Founder Systems\ie2.dll
                    Filesize

                    13KB

                    MD5

                    80f37b86aa4d710bd6c2d02ef144c018

                    SHA1

                    1b2b9c3bbc656c61b583301bb0f67b6aa5013cf2

                    SHA256

                    05bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e

                    SHA512

                    8ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b

                  • memory/776-59-0x0000000000000000-mapping.dmp
                  • memory/784-66-0x0000000000000000-mapping.dmp
                  • memory/976-56-0x0000000000400000-0x00000000004D6000-memory.dmp
                    Filesize

                    856KB

                  • memory/976-55-0x00000000005C0000-0x0000000000603000-memory.dmp
                    Filesize

                    268KB

                  • memory/976-54-0x0000000075E51000-0x0000000075E53000-memory.dmp
                    Filesize

                    8KB

                  • memory/1152-64-0x0000000000000000-mapping.dmp
                  • memory/1184-57-0x0000000000000000-mapping.dmp
                  • memory/1332-78-0x00000000005A0000-0x00000000005AA000-memory.dmp
                    Filesize

                    40KB

                  • memory/1332-69-0x0000000000000000-mapping.dmp
                  • memory/1332-71-0x0000000000F70000-0x0000000000F82000-memory.dmp
                    Filesize

                    72KB

                  • memory/1332-75-0x00000000005A0000-0x00000000005AA000-memory.dmp
                    Filesize

                    40KB

                  • memory/1368-60-0x0000000000000000-mapping.dmp
                  • memory/1400-63-0x0000000000000000-mapping.dmp
                  • memory/1500-68-0x0000000000000000-mapping.dmp
                  • memory/1744-65-0x0000000000000000-mapping.dmp
                  • memory/1808-58-0x0000000000000000-mapping.dmp
                  • memory/1868-67-0x0000000000000000-mapping.dmp