Analysis

  • max time kernel
    23s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 11:59

General

  • Target

    00d250402c1ffa84b7564e20fe10de9adb0611400cccbea1c689ebb759d77e5a.exe

  • Size

    632KB

  • MD5

    81969455d579798b16e46099bc1befe4

  • SHA1

    51206957215717be58da7027c0509aab0d4fbaaa

  • SHA256

    00d250402c1ffa84b7564e20fe10de9adb0611400cccbea1c689ebb759d77e5a

  • SHA512

    6f7be945b5be56c7e6474668f163a9f190eeeacd4fa0d8ade077dc765aabfde43bd3055bcbb46f86d7d3c7c05647f0bcdd572ab27a40558406288b1bc3e2a033

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00d250402c1ffa84b7564e20fe10de9adb0611400cccbea1c689ebb759d77e5a.exe
    "C:\Users\Admin\AppData\Local\Temp\00d250402c1ffa84b7564e20fe10de9adb0611400cccbea1c689ebb759d77e5a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha7632\ie\MediaViewV1alpha7632.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1528
    • C:\Windows\SysWOW64\gpupdate.exe
      "C:\Windows\System32\gpupdate.exe" /force
      2⤵
        PID:856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Browser Extensions

    1
    T1176

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha7632\ie\MediaViewV1alpha7632.dll
      Filesize

      85KB

      MD5

      e2143f6b74295c6593266c2bebd30d74

      SHA1

      36c514e81645fa26e9a090a555769220b430553a

      SHA256

      962388dea3c443df52814fd9813ca2d53cc6e02ccb0a050fc5d6a604d22f52bf

      SHA512

      cccce9222ef906d65318ed8c7aade5aaf88a490754befe47585044c739f4cdc740e0f68063311d8c459cb122cd4cebd083e5f63358da8a5643e2fbaa1b5671c8

    • \Program Files (x86)\MediaViewV1\MediaViewV1alpha7632\ie\MediaViewV1alpha7632.dll
      Filesize

      85KB

      MD5

      e2143f6b74295c6593266c2bebd30d74

      SHA1

      36c514e81645fa26e9a090a555769220b430553a

      SHA256

      962388dea3c443df52814fd9813ca2d53cc6e02ccb0a050fc5d6a604d22f52bf

      SHA512

      cccce9222ef906d65318ed8c7aade5aaf88a490754befe47585044c739f4cdc740e0f68063311d8c459cb122cd4cebd083e5f63358da8a5643e2fbaa1b5671c8

    • \Users\Admin\AppData\Local\Temp\nsjCE2A.tmp\aminsis.dll
      Filesize

      99KB

      MD5

      7c563d580804bc0f6c400ff278bceb18

      SHA1

      3291122597ac536847bf2ec60f3dbce89ec3b19c

      SHA256

      323744dd6b3dc84c79b58aeaf97302805818f64d7b34b70425351e1e127dd276

      SHA512

      f1088c36054b8f0daaf4aed0f0c85f3cff52e3a1a172424dd710ee590f6d708aa2a42b9ba03fc92ff7b92a48be9a35a9f7fccb2c4c394619f808627295a0e9f4

    • memory/856-60-0x0000000000000000-mapping.dmp
    • memory/964-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
      Filesize

      8KB

    • memory/1528-56-0x0000000000000000-mapping.dmp