Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    10-06-2022 08:42

General

  • Target

    07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe

  • Size

    441KB

  • MD5

    640d463147a42e2ebadf1b854d42dec6

  • SHA1

    ac01be640d2cdccdf69ae9b6c03e66157aa285b0

  • SHA256

    07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0

  • SHA512

    6b78ef7b582a5a6985c6e52a8c71369cecbeb348bd36b8eac122a1904d16f3e8b4b7b5f322f458ed16af7538fa3e73701ec91bb855a3d69730a05970823afa05

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe
    "C:\Users\Admin\AppData\Local\Temp\07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe
      "C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe"
      2⤵
      • Executes dropped EXE
      PID:2020
    • C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exe
      "C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exe"
      2⤵
        PID:1300
      • C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe
        "C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe"
        2⤵
          PID:1620
        • C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe
          "C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"
          2⤵
            PID:1816
          • C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe
            "C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"
            2⤵
            • Executes dropped EXE
            PID:640

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Modify Existing Service

        1
        T1031

        Defense Evasion

        Modify Registry

        2
        T1112

        Disabling Security Tools

        1
        T1089

        Install Root Certificate

        1
        T1130

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe
          Filesize

          335KB

          MD5

          68f9204a733a878116aa2ce6e1aabe5a

          SHA1

          2c740d93a0437ba6e6c902a72c779f6ecb9802e3

          SHA256

          53e39bc8b5b4d0195a727b29654d51adcf1e20b8fab494b777c5e88ec51cddd9

          SHA512

          61d58b98ef968a5c41b8b1c741bddffd83f5b1f3a4a59fb71e2375198a44e0012682c7ba1446f655149d1bcb46cc3f082b6fbdcc04a9abb2e7ae2e93b1e3cbad

        • C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe
          Filesize

          335KB

          MD5

          68f9204a733a878116aa2ce6e1aabe5a

          SHA1

          2c740d93a0437ba6e6c902a72c779f6ecb9802e3

          SHA256

          53e39bc8b5b4d0195a727b29654d51adcf1e20b8fab494b777c5e88ec51cddd9

          SHA512

          61d58b98ef968a5c41b8b1c741bddffd83f5b1f3a4a59fb71e2375198a44e0012682c7ba1446f655149d1bcb46cc3f082b6fbdcc04a9abb2e7ae2e93b1e3cbad

        • C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe
          Filesize

          727KB

          MD5

          2fbf6438efaf266f67e3b5dab90f99cd

          SHA1

          71bfd76506879b21c221e83771ce7518493681ec

          SHA256

          ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f

          SHA512

          9372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f

        • \Users\Admin\Pictures\Adobe Films\6523.exe.exe
          Filesize

          202KB

          MD5

          6d00c6d377738da756cf15e47620933f

          SHA1

          b2c3489481ffb64debcdda47bdd9a0d587402b07

          SHA256

          f3822ebafa4ccb955f3e93845c565ea9b7eaf6a8ac3e5ccb0461e94f86d916f0

          SHA512

          e6ed3cb352a85b7bf9cd1323ec2e6f91253e9abf6c5c9ac4345d71a400ce2d0ae6f481ebf1245fb385bf72d5aa560b4c17fbfb70f4cbddf352ac335b2a2c2936

        • \Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe
          Filesize

          4.6MB

          MD5

          f31d52ed4388f89e790988f13f98c0cd

          SHA1

          509e54da32e0f44cf3244b5e5a625535d66a1800

          SHA256

          5daf7769453a91c6dbc1691ec27f7c2af87953490493e459865596d17f58d3b8

          SHA512

          d0c3743258e5e393ddbe5fbf3dbd315626f76bc610f86f3f6e0244ae9237abefcc6d15445ec996c1efd31a66eb9deb2083956adf986ca555114b51eea3d156f1

        • \Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe
          Filesize

          335KB

          MD5

          68f9204a733a878116aa2ce6e1aabe5a

          SHA1

          2c740d93a0437ba6e6c902a72c779f6ecb9802e3

          SHA256

          53e39bc8b5b4d0195a727b29654d51adcf1e20b8fab494b777c5e88ec51cddd9

          SHA512

          61d58b98ef968a5c41b8b1c741bddffd83f5b1f3a4a59fb71e2375198a44e0012682c7ba1446f655149d1bcb46cc3f082b6fbdcc04a9abb2e7ae2e93b1e3cbad

        • \Users\Admin\Pictures\Adobe Films\test30206.bmp.exe
          Filesize

          727KB

          MD5

          2fbf6438efaf266f67e3b5dab90f99cd

          SHA1

          71bfd76506879b21c221e83771ce7518493681ec

          SHA256

          ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f

          SHA512

          9372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f

        • \Users\Admin\Pictures\Adobe Films\test30206.bmp.exe
          Filesize

          727KB

          MD5

          2fbf6438efaf266f67e3b5dab90f99cd

          SHA1

          71bfd76506879b21c221e83771ce7518493681ec

          SHA256

          ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f

          SHA512

          9372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f

        • memory/640-63-0x0000000000000000-mapping.dmp
        • memory/1048-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
          Filesize

          8KB

        • memory/1048-56-0x0000000003C90000-0x0000000003E50000-memory.dmp
          Filesize

          1.8MB

        • memory/1048-55-0x0000000003C90000-0x0000000003E50000-memory.dmp
          Filesize

          1.8MB

        • memory/1620-69-0x0000000000000000-mapping.dmp
        • memory/2020-58-0x0000000000000000-mapping.dmp