Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-05-2022 22:40

General

  • Target

    0cd4c14a7f8a6569f5f45f9f38bb04a7537ac27f855c5a1b8fd407018de4da5b.exe

  • Size

    632KB

  • MD5

    0c62977e1d1fc1edb912900ab8900e1a

  • SHA1

    862af3224207923f1e6b750b33f49c121e81de4f

  • SHA256

    0cd4c14a7f8a6569f5f45f9f38bb04a7537ac27f855c5a1b8fd407018de4da5b

  • SHA512

    01c14ea2a37f0561449421671a85bb95b2f3f44d06f8ee7bf65218576d8dbe7af76e6785d270b9474971b0c6b71787aab2071f29fdbf5d51e48fb1d0bc927214

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cd4c14a7f8a6569f5f45f9f38bb04a7537ac27f855c5a1b8fd407018de4da5b.exe
    "C:\Users\Admin\AppData\Local\Temp\0cd4c14a7f8a6569f5f45f9f38bb04a7537ac27f855c5a1b8fd407018de4da5b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha6462\ie\MediaViewV1alpha6462.dll" /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1612
    • C:\Windows\SysWOW64\gpupdate.exe
      "C:\Windows\System32\gpupdate.exe" /force
      2⤵
        PID:1528

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Browser Extensions

    1
    T1176

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha6462\ie\MediaViewV1alpha6462.dll
      Filesize

      85KB

      MD5

      2bdff681fd8646cce3247f155a8810b6

      SHA1

      1fa90019611927589a6377146f8cc551e9d6b8cf

      SHA256

      c4bf924ac78e7969130805125e10adf06bc6227d333c03af3137c743a6c11d10

      SHA512

      442909fe0d286fb4aa500dcd77b24c68cda1afff008be60dae9a7aed16fcc7a5276a5972306f9553999e02d8c42fdab0d8eff392ff938ebb19a6ddadc374044a

    • \Program Files (x86)\MediaViewV1\MediaViewV1alpha6462\ie\MediaViewV1alpha6462.dll
      Filesize

      85KB

      MD5

      2bdff681fd8646cce3247f155a8810b6

      SHA1

      1fa90019611927589a6377146f8cc551e9d6b8cf

      SHA256

      c4bf924ac78e7969130805125e10adf06bc6227d333c03af3137c743a6c11d10

      SHA512

      442909fe0d286fb4aa500dcd77b24c68cda1afff008be60dae9a7aed16fcc7a5276a5972306f9553999e02d8c42fdab0d8eff392ff938ebb19a6ddadc374044a

    • \Users\Admin\AppData\Local\Temp\nstFAA6.tmp\aminsis.dll
      Filesize

      559KB

      MD5

      75fccc3ffe4fdeaa26b9098975ba3772

      SHA1

      9f04339adecad084b9696f757a8c12d3fd036be0

      SHA256

      71fd0603ba5bb405a0d134595c0d7f7d2ffd83bf1d083d4ccb6e7382f5bef81e

      SHA512

      bd3c65aa43b88dd3e1449180944d7dd6df3734fb1097117be4285b8b4bd72e7decf5e3e18e8a49b51b71b47b9ae9e444128dfeb1167a4b04a08dc220d314e3bd

    • memory/1528-60-0x0000000000000000-mapping.dmp
    • memory/1612-56-0x0000000000000000-mapping.dmp
    • memory/1992-54-0x0000000074E91000-0x0000000074E93000-memory.dmp
      Filesize

      8KB