Analysis

  • max time kernel
    136s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    28-05-2022 05:18

General

  • Target

    024d8f1ad5dce7c7d6b23adad0a7a69dbb2efb046b1ee9ec0510551557a8f6e6.exe

  • Size

    1000KB

  • MD5

    425e54bd9569b5083e5db069b895ff43

  • SHA1

    1d95ea09365ef6b4a95bf98e72e051b31f742cbe

  • SHA256

    024d8f1ad5dce7c7d6b23adad0a7a69dbb2efb046b1ee9ec0510551557a8f6e6

  • SHA512

    45acfb6b7b125dbdb5af60c3206630286b726c23beb6d37d4f15612569fbd88243cae6068f9b9956624f0840d586aec53a783d402dcc433810c222c286351c6b

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\024d8f1ad5dce7c7d6b23adad0a7a69dbb2efb046b1ee9ec0510551557a8f6e6.exe
    "C:\Users\Admin\AppData\Local\Temp\024d8f1ad5dce7c7d6b23adad0a7a69dbb2efb046b1ee9ec0510551557a8f6e6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta5756\ie\VideoPlayerV3beta5756.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta5756\ie\VideoPlayerV3beta5756.dll
    Filesize

    85KB

    MD5

    da60dccb0d31520366cf00377174f678

    SHA1

    1e395db131f3ef4aec99fadf1a3363a2205b6028

    SHA256

    01cdd6df65348a5d7ade83e79b5c5a86912eadcb8bca33754732fb79d5d16a88

    SHA512

    b77e1d004d2c49257da1cf54da6a20ec75068eed13458ca9077ec8ff1c01f843f0aab2942bb6dc39c20df6c0f9f84df1aa0983c169b0425e8f1ec105afd336a8

  • C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta5756\ie\VideoPlayerV3beta5756.dll
    Filesize

    85KB

    MD5

    da60dccb0d31520366cf00377174f678

    SHA1

    1e395db131f3ef4aec99fadf1a3363a2205b6028

    SHA256

    01cdd6df65348a5d7ade83e79b5c5a86912eadcb8bca33754732fb79d5d16a88

    SHA512

    b77e1d004d2c49257da1cf54da6a20ec75068eed13458ca9077ec8ff1c01f843f0aab2942bb6dc39c20df6c0f9f84df1aa0983c169b0425e8f1ec105afd336a8

  • C:\Users\Admin\AppData\Local\Temp\nsrE6AC.tmp\aminsis.dll
    Filesize

    822KB

    MD5

    678a22e736f3bfa0d74ae2b1133a4c77

    SHA1

    964bbaf745a2b82bc23de0879b221bf6551b7283

    SHA256

    c5799cbab76464874e857fbd16600c4b33298d809f4ef27a07b21f8724614f14

    SHA512

    058fa4ee5272623fcc9267958ad6d7befeb74efa079b8fa8e461830ec05b96ed933014360eac5ab61eff890b8ec1ea268d8b2781999515ed27ba0333751baa4a

  • memory/4880-131-0x0000000000000000-mapping.dmp