Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 22:40

General

  • Target

    120cd3dc895723f8e5ef3e5b391527b375e7e2d9f80839a2301f0861d3c852ba.exe

  • Size

    360KB

  • MD5

    e558c68f684dff0930fa3167a3d85385

  • SHA1

    94cf171669401068b8047c04f0679bbd2f3c24df

  • SHA256

    120cd3dc895723f8e5ef3e5b391527b375e7e2d9f80839a2301f0861d3c852ba

  • SHA512

    e3d9c7c003c697775682444782a6b4068132b314c06248c12aecc53fc04135ce920437e06f329c873605370cbb0eb645d381c6c7851eae1da3fd4b313a8db482

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1416
      • C:\Users\Admin\AppData\Local\Temp\120cd3dc895723f8e5ef3e5b391527b375e7e2d9f80839a2301f0861d3c852ba.exe
        "C:\Users\Admin\AppData\Local\Temp\120cd3dc895723f8e5ef3e5b391527b375e7e2d9f80839a2301f0861d3c852ba.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1240
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      1⤵
        PID:472

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\nsi6E5.tmp\System.dll
        Filesize

        11KB

        MD5

        a4dd044bcd94e9b3370ccf095b31f896

        SHA1

        17c78201323ab2095bc53184aa8267c9187d5173

        SHA256

        2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

        SHA512

        87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

      • \Users\Admin\AppData\Local\Temp\nsi6E5.tmp\System.dll
        Filesize

        11KB

        MD5

        a4dd044bcd94e9b3370ccf095b31f896

        SHA1

        17c78201323ab2095bc53184aa8267c9187d5173

        SHA256

        2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

        SHA512

        87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

      • memory/260-71-0x0000000000110000-0x0000000000115000-memory.dmp
        Filesize

        20KB

      • memory/284-89-0x00000000002D0000-0x00000000002D5000-memory.dmp
        Filesize

        20KB

      • memory/328-88-0x0000000001540000-0x0000000001545000-memory.dmp
        Filesize

        20KB

      • memory/332-72-0x0000000000830000-0x0000000000835000-memory.dmp
        Filesize

        20KB

      • memory/368-73-0x0000000000150000-0x0000000000155000-memory.dmp
        Filesize

        20KB

      • memory/384-74-0x00000000004D0000-0x00000000004D5000-memory.dmp
        Filesize

        20KB

      • memory/420-75-0x00000000000C0000-0x00000000000C5000-memory.dmp
        Filesize

        20KB

      • memory/464-76-0x00000000001F0000-0x00000000001F5000-memory.dmp
        Filesize

        20KB

      • memory/472-68-0x0000000000050000-mapping.dmp
      • memory/472-94-0x0000000000050000-0x0000000000055000-memory.dmp
        Filesize

        20KB

      • memory/480-77-0x0000000000370000-0x0000000000375000-memory.dmp
        Filesize

        20KB

      • memory/488-82-0x0000000000180000-0x0000000000185000-memory.dmp
        Filesize

        20KB

      • memory/600-78-0x0000000000160000-0x0000000000165000-memory.dmp
        Filesize

        20KB

      • memory/676-83-0x00000000000F0000-0x00000000000F5000-memory.dmp
        Filesize

        20KB

      • memory/764-84-0x0000000000880000-0x0000000000885000-memory.dmp
        Filesize

        20KB

      • memory/816-85-0x00000000007F0000-0x00000000007F5000-memory.dmp
        Filesize

        20KB

      • memory/852-86-0x00000000003D0000-0x00000000003D5000-memory.dmp
        Filesize

        20KB

      • memory/880-87-0x00000000007D0000-0x00000000007D5000-memory.dmp
        Filesize

        20KB

      • memory/1032-79-0x0000000000280000-0x0000000000285000-memory.dmp
        Filesize

        20KB

      • memory/1084-92-0x0000000000170000-0x0000000000175000-memory.dmp
        Filesize

        20KB

      • memory/1208-80-0x0000000000180000-0x0000000000185000-memory.dmp
        Filesize

        20KB

      • memory/1240-66-0x0000000010000000-0x0000000010015000-memory.dmp
        Filesize

        84KB

      • memory/1240-81-0x0000000002060000-0x0000000002224000-memory.dmp
        Filesize

        1.8MB

      • memory/1240-69-0x0000000000A90000-0x0000000000A98000-memory.dmp
        Filesize

        32KB

      • memory/1240-70-0x00000000000D0000-0x00000000000D5000-memory.dmp
        Filesize

        20KB

      • memory/1240-64-0x0000000000000000-mapping.dmp
      • memory/1240-67-0x00000000001F0000-0x000000000020C000-memory.dmp
        Filesize

        112KB

      • memory/1296-90-0x0000000001B40000-0x0000000001B45000-memory.dmp
        Filesize

        20KB

      • memory/1372-91-0x00000000001A0000-0x00000000001A5000-memory.dmp
        Filesize

        20KB

      • memory/1972-63-0x0000000074B91000-0x0000000074B93000-memory.dmp
        Filesize

        8KB

      • memory/1972-62-0x00000000024A0000-0x00000000030EA000-memory.dmp
        Filesize

        12.3MB

      • memory/1972-57-0x0000000002E00000-0x0000000002E4D000-memory.dmp
        Filesize

        308KB

      • memory/1972-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
        Filesize

        8KB

      • memory/1988-93-0x0000000000090000-0x0000000000095000-memory.dmp
        Filesize

        20KB