Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-05-2022 19:29

General

  • Target

    0082320d98cb948eeb081253c86bc0b40eab08fd89e2d1bd11850c5bd47a394e.exe

  • Size

    944KB

  • MD5

    86a9eafbb14ec426b17c6ce39039baa1

  • SHA1

    30f37d899af6fcbd88a82463d40e6657feb34f37

  • SHA256

    0082320d98cb948eeb081253c86bc0b40eab08fd89e2d1bd11850c5bd47a394e

  • SHA512

    5b249e3a938161ebda4cc64b8b8ce0dc41c632a89d1d28cd89cd5b14fb512a20a4e6fa33cd802691f3e4b90b3f98aa1ee4fdb7081d773da8d4a1d9f46d759753

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0082320d98cb948eeb081253c86bc0b40eab08fd89e2d1bd11850c5bd47a394e.exe
    "C:\Users\Admin\AppData\Local\Temp\0082320d98cb948eeb081253c86bc0b40eab08fd89e2d1bd11850c5bd47a394e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha5762\ie\MediaViewerV1alpha5762.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:900

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha5762\ie\MediaViewerV1alpha5762.dll
    Filesize

    85KB

    MD5

    7ccb620872d0e12c225d764160c8deab

    SHA1

    40ddc72f16eeb7f03e7413e712a73bed89482650

    SHA256

    1816354fcfeeb398b39a04052fab4e3d7dd43970a9c92b0b71ae45f3d48789c8

    SHA512

    0a18edd017e3499a5ce56392428af2d86e085e6d28bbd08c48387f8d114d245b50c39d2055d1b09363158246515c4a636a05a28145db8abeeb2e26cdfa1d1e92

  • \Program Files (x86)\MediaViewerV1\MediaViewerV1alpha5762\ie\MediaViewerV1alpha5762.dll
    Filesize

    85KB

    MD5

    7ccb620872d0e12c225d764160c8deab

    SHA1

    40ddc72f16eeb7f03e7413e712a73bed89482650

    SHA256

    1816354fcfeeb398b39a04052fab4e3d7dd43970a9c92b0b71ae45f3d48789c8

    SHA512

    0a18edd017e3499a5ce56392428af2d86e085e6d28bbd08c48387f8d114d245b50c39d2055d1b09363158246515c4a636a05a28145db8abeeb2e26cdfa1d1e92

  • \Users\Admin\AppData\Local\Temp\nso9F.tmp\aminsis.dll
    Filesize

    834KB

    MD5

    14ad04243334645f399639b028f21d17

    SHA1

    7368866dc95621a1407d2105d040da2cc9852ba9

    SHA256

    02d13f28df1314640474ee77cd202a2c0da8e1d609c614f8fdff4451f8ee63fa

    SHA512

    3859b6f6e7e46ba70fa0be24fd2ceadf3db746818f11a09109c7bb678ee4fc08824a0cf15c77df09c3b2bdc2a80067a98130660152f5ee61e4bd501ef5ed1728

  • memory/756-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB

  • memory/900-56-0x0000000000000000-mapping.dmp