Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-05-2022 21:45

General

  • Target

    0d1c29f9674d7dd038221e8d3053b70f1e36bce54531eff08b0d122b3cdd8472.exe

  • Size

    1000KB

  • MD5

    501c35c30856063578d5f66e21af9de8

  • SHA1

    a1bbcfa137ac506b4d9b0af6ba71fa4d75c652f8

  • SHA256

    0d1c29f9674d7dd038221e8d3053b70f1e36bce54531eff08b0d122b3cdd8472

  • SHA512

    f26df8ad2b366901138a180a3a4800a4ad864a017bc2973dd44e04df6620f352ae3cb54c597b6980b934fd716b7733d6900abc48701433f19fae0f12b373cdd8

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d1c29f9674d7dd038221e8d3053b70f1e36bce54531eff08b0d122b3cdd8472.exe
    "C:\Users\Admin\AppData\Local\Temp\0d1c29f9674d7dd038221e8d3053b70f1e36bce54531eff08b0d122b3cdd8472.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta7334\ie\VideoPlayerV3beta7334.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1936

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta7334\ie\VideoPlayerV3beta7334.dll
    Filesize

    85KB

    MD5

    474430f69405c07f95f75feee5a50383

    SHA1

    63e8550d91e5b99776b5841b5568173b67f469fc

    SHA256

    41855f8991ac3b7df9c4fe78723ffafc4eb4c5e332a04d91efbc8f8f3e52f127

    SHA512

    85051703f3b2efd0815b11b3b9376efc2c3a69cf96d16fbcd11b7aeb4a9d7eb7a861a709c5a65a5cc4eddf6eea5c090c5559ddf76a274f01064f1fdc6b9ca0be

  • \Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta7334\ie\VideoPlayerV3beta7334.dll
    Filesize

    85KB

    MD5

    474430f69405c07f95f75feee5a50383

    SHA1

    63e8550d91e5b99776b5841b5568173b67f469fc

    SHA256

    41855f8991ac3b7df9c4fe78723ffafc4eb4c5e332a04d91efbc8f8f3e52f127

    SHA512

    85051703f3b2efd0815b11b3b9376efc2c3a69cf96d16fbcd11b7aeb4a9d7eb7a861a709c5a65a5cc4eddf6eea5c090c5559ddf76a274f01064f1fdc6b9ca0be

  • \Users\Admin\AppData\Local\Temp\nsiEA8F.tmp\aminsis.dll
    Filesize

    822KB

    MD5

    678a22e736f3bfa0d74ae2b1133a4c77

    SHA1

    964bbaf745a2b82bc23de0879b221bf6551b7283

    SHA256

    c5799cbab76464874e857fbd16600c4b33298d809f4ef27a07b21f8724614f14

    SHA512

    058fa4ee5272623fcc9267958ad6d7befeb74efa079b8fa8e461830ec05b96ed933014360eac5ab61eff890b8ec1ea268d8b2781999515ed27ba0333751baa4a

  • memory/1936-56-0x0000000000000000-mapping.dmp
  • memory/1948-54-0x0000000076721000-0x0000000076723000-memory.dmp
    Filesize

    8KB