Analysis

  • max time kernel
    123s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-05-2022 20:12

General

  • Target

    04b7ee705566fc1d29ae3e4b4c1a3e2d2cf1856e1973140429c17ed8924ae378.exe

  • Size

    951KB

  • MD5

    7a75c57c59b4c420b1c00cd04f0d1b47

  • SHA1

    03aadda0e578fe79dcc2b8ada1184ada651b1072

  • SHA256

    04b7ee705566fc1d29ae3e4b4c1a3e2d2cf1856e1973140429c17ed8924ae378

  • SHA512

    dff90ca3cf57d84405707c3ea59a771d01da3b1a1db92dcf04f07923355b409595ca8cd5c178f6d25c6956a55a3790c5df9b930fafbb199c31af8f3e9af52e2d

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04b7ee705566fc1d29ae3e4b4c1a3e2d2cf1856e1973140429c17ed8924ae378.exe
    "C:\Users\Admin\AppData\Local\Temp\04b7ee705566fc1d29ae3e4b4c1a3e2d2cf1856e1973140429c17ed8924ae378.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\WebexpEnhancedV1\WebexpEnhancedV1alpha1670\ie\WebexpEnhancedV1alpha1670.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:3520

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WebexpEnhancedV1\WebexpEnhancedV1alpha1670\ie\WebexpEnhancedV1alpha1670.dll
    Filesize

    85KB

    MD5

    f0d3d087605a21a70aec3078318c7ab4

    SHA1

    1f129d79bef6181109e30813e3ac67379802abd0

    SHA256

    6c767b6600202e931bbd878ef3bf5951f8d077e3b1fd32246cb781234b61d661

    SHA512

    8380cebb8c4cb06cc08e96ab34041487afbaf35a6eda6c8d486832f114cadcf557f61060ca2c8f650120c43364d64715eb973a2e61d0ed0cb5f89c7e5c45d14c

  • C:\Program Files (x86)\WebexpEnhancedV1\WebexpEnhancedV1alpha1670\ie\WebexpEnhancedV1alpha1670.dll
    Filesize

    85KB

    MD5

    f0d3d087605a21a70aec3078318c7ab4

    SHA1

    1f129d79bef6181109e30813e3ac67379802abd0

    SHA256

    6c767b6600202e931bbd878ef3bf5951f8d077e3b1fd32246cb781234b61d661

    SHA512

    8380cebb8c4cb06cc08e96ab34041487afbaf35a6eda6c8d486832f114cadcf557f61060ca2c8f650120c43364d64715eb973a2e61d0ed0cb5f89c7e5c45d14c

  • C:\Users\Admin\AppData\Local\Temp\nsjDE50.tmp\aminsis.dll
    Filesize

    816KB

    MD5

    9e572388e5ef693ffd6ac7a0a53aa5ab

    SHA1

    8aec75a79c6ccc96d998a9f4ea68b20540eb3e0e

    SHA256

    bb12ecdbd2c8ec32ae5903b096815e160d8798d4c89dcd4b493dcb9be3b0d403

    SHA512

    97fef04ca20cdf59869d8b0709d5216c07bcba455562f37a613293671946f1224d8ddc2e9fc7040c7c764391b2aeaa772e62e8c2cd7c566ed70060982efa3590

  • memory/3520-131-0x0000000000000000-mapping.dmp