Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-05-2022 02:58

General

  • Target

    0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe

  • Size

    264KB

  • MD5

    4716e1ece995483a7218df80bc8956d6

  • SHA1

    453684c742ba590b0e5d973cebe019f091958ec6

  • SHA256

    0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d

  • SHA512

    163db67ba0c82471c5e9349ec3895114d367a4346b7359091fc059edd4966cbe4782d8210060e1f4413f2458e57417b9af01ff1d4e7dc8c5b88295640b08a4c9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2344
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2388
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2504
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3464
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3400
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3292
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                1⤵
                  PID:3088
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3800
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:3544
                    • C:\Windows\Explorer.EXE
                      C:\Windows\Explorer.EXE
                      1⤵
                        PID:2180
                        • C:\Users\Admin\AppData\Local\Temp\0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe
                          "C:\Users\Admin\AppData\Local\Temp\0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe"
                          2⤵
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • Modifies Internet Explorer settings
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2728
                          • C:\Users\Admin\AppData\Roaming\Xeoxripuhux\ycvameinot.exe
                            "C:\Users\Admin\AppData\Roaming\Xeoxripuhux\ycvameinot.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3000
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf6880dcd.bat"
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1460
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:4556

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\tmp7A1.tmp
                          Filesize

                          1.6MB

                          MD5

                          4f3387277ccbd6d1f21ac5c07fe4ca68

                          SHA1

                          e16506f662dc92023bf82def1d621497c8ab5890

                          SHA256

                          767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                          SHA512

                          9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

                        • C:\Users\Admin\AppData\Local\Temp\tmp7C1.tmp
                          Filesize

                          625KB

                          MD5

                          eccf28d7e5ccec24119b88edd160f8f4

                          SHA1

                          98509587a3d37a20b56b50fd57f823a1691a034c

                          SHA256

                          820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6

                          SHA512

                          c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670

                        • C:\Users\Admin\AppData\Local\Temp\tmpFA33.tmp
                          Filesize

                          1.6MB

                          MD5

                          4f3387277ccbd6d1f21ac5c07fe4ca68

                          SHA1

                          e16506f662dc92023bf82def1d621497c8ab5890

                          SHA256

                          767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                          SHA512

                          9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

                        • C:\Users\Admin\AppData\Local\Temp\tmpFA83.tmp
                          Filesize

                          625KB

                          MD5

                          eccf28d7e5ccec24119b88edd160f8f4

                          SHA1

                          98509587a3d37a20b56b50fd57f823a1691a034c

                          SHA256

                          820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6

                          SHA512

                          c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670

                        • C:\Users\Admin\AppData\Local\Temp\tmpf6880dcd.bat
                          Filesize

                          307B

                          MD5

                          f5ee7ac81097c27915759865c0251023

                          SHA1

                          444a7686bbf7ad762000b882f0357f89edcb9b4d

                          SHA256

                          de2646da72db972e9342835ba85ab9df46894e6723ab028bee829ad773984605

                          SHA512

                          ce42812e489098d9532c53f9b8838d62caa860952b5d6f211056bd2b554cf5097dee7dd82d45761261b6c25aa61d7dc28986e2ae834b0ef39f75974a88436d4b

                        • C:\Users\Admin\AppData\Roaming\Doafxyryryac\ynkowavafe.wal
                          Filesize

                          2KB

                          MD5

                          45ba3bc9530521e313b077b2a453995c

                          SHA1

                          9e317eaefbc1dea459fc0ddd5193081d9ca9855a

                          SHA256

                          eb5e0dceea86352883c720d43575a3b28536dd99faf8f8130029bc92234447de

                          SHA512

                          131e6cfa6d210c4c6b75f558e293fa5cddbcf5e723a8b63538bc13ef914e06ffe4b609db0f6ce75d4d05f65612d1daa2b4e58a8895757c7b54479e06972449b7

                        • C:\Users\Admin\AppData\Roaming\Xeoxripuhux\ycvameinot.exe
                          Filesize

                          264KB

                          MD5

                          9d6beb928ff50b9ea2dfc2e0cb406d07

                          SHA1

                          90e76199e39337493e20883c1cfe168d72355cfa

                          SHA256

                          5ba40f60aed4f05ef4af0c4d69d3f5f0e5d1ccfc9a27e07f4f201f5d55f191fe

                          SHA512

                          25edd2a3b939e41dc38541f434ab123aabe9b20bf6ce4daee729c28947d1d1cd3387c2e8fc07fe370eff0401a09d9e80172804fe84cb30275c64b3c017cea971

                        • C:\Users\Admin\AppData\Roaming\Xeoxripuhux\ycvameinot.exe
                          Filesize

                          264KB

                          MD5

                          9d6beb928ff50b9ea2dfc2e0cb406d07

                          SHA1

                          90e76199e39337493e20883c1cfe168d72355cfa

                          SHA256

                          5ba40f60aed4f05ef4af0c4d69d3f5f0e5d1ccfc9a27e07f4f201f5d55f191fe

                          SHA512

                          25edd2a3b939e41dc38541f434ab123aabe9b20bf6ce4daee729c28947d1d1cd3387c2e8fc07fe370eff0401a09d9e80172804fe84cb30275c64b3c017cea971

                        • memory/1460-146-0x0000000000B70000-0x0000000000BB7000-memory.dmp
                          Filesize

                          284KB

                        • memory/1460-150-0x0000000000B70000-0x0000000000BB7000-memory.dmp
                          Filesize

                          284KB

                        • memory/1460-145-0x0000000000000000-mapping.dmp
                        • memory/2728-147-0x00000000021F0000-0x0000000002237000-memory.dmp
                          Filesize

                          284KB

                        • memory/2728-133-0x0000000000400000-0x0000000000447000-memory.dmp
                          Filesize

                          284KB

                        • memory/2728-144-0x00000000021F0000-0x0000000002237000-memory.dmp
                          Filesize

                          284KB

                        • memory/2728-134-0x0000000000400000-0x0000000000447000-memory.dmp
                          Filesize

                          284KB

                        • memory/3000-137-0x0000000000000000-mapping.dmp