Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-06-2022 17:13

General

  • Target

    5DCF34F35A1874D190C81C7197785C4F4F9305842918F.exe

  • Size

    312KB

  • MD5

    ce4b358d37051ea1c94278239faae503

  • SHA1

    70c4dedb69612151bf670ac12d73373db8227b1b

  • SHA256

    5dcf34f35a1874d190c81c7197785c4f4f9305842918fc70fe9d912040978422

  • SHA512

    cd512ac255c687db5af7ca2d78ccacd53b45c7e2d1610776c51f4a9e8343bfea76b31dc4d7da185ce1785c83a626a75a29efcc225203ae1750a39307e2c85432

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5DCF34F35A1874D190C81C7197785C4F4F9305842918F.exe
    "C:\Users\Admin\AppData\Local\Temp\5DCF34F35A1874D190C81C7197785C4F4F9305842918F.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\Pictures\Adobe Films\MfDLbTBx_jymxcvFZ2rqn3Af.exe
      "C:\Users\Admin\Pictures\Adobe Films\MfDLbTBx_jymxcvFZ2rqn3Af.exe"
      2⤵
      • Executes dropped EXE
      PID:928
    • C:\Users\Admin\Pictures\Adobe Films\y5rcAXM6DSDdIIIIjOmdm8ws.exe
      "C:\Users\Admin\Pictures\Adobe Films\y5rcAXM6DSDdIIIIjOmdm8ws.exe"
      2⤵
      • Executes dropped EXE
      PID:804
    • C:\Users\Admin\Pictures\Adobe Films\_P2D629lujq6WIrc2G6qpkqc.exe
      "C:\Users\Admin\Pictures\Adobe Films\_P2D629lujq6WIrc2G6qpkqc.exe"
      2⤵
        PID:1148

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    Modify Registry

    2
    T1112

    Disabling Security Tools

    1
    T1089

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Pictures\Adobe Films\y5rcAXM6DSDdIIIIjOmdm8ws.exe
      Filesize

      365KB

      MD5

      14d1ed8606ad8a67bb9e8cabbac889cb

      SHA1

      682ae84172e9ada44fc0cd270769384159e7f162

      SHA256

      ba9e8bb18f192acac89f06ccce7e87b63128727bbaa7b3e1b2d95adb5449b853

      SHA512

      b1a999a9d7615a7fa98e048f3132b4b4a86b811173ce7e80da9eb6c57f1b8e6bfda73f16da3b3553d06c2ad33404ef0716ba0db8cf859564d0155ef694259a50

    • \Users\Admin\Pictures\Adobe Films\MfDLbTBx_jymxcvFZ2rqn3Af.exe
      Filesize

      393KB

      MD5

      b0788093ab423639aefac4eb31d8a2d1

      SHA1

      35d5bfc9f3ff67a50558fccbe8b2c45eead03661

      SHA256

      6e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d

      SHA512

      7cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758

    • \Users\Admin\Pictures\Adobe Films\MfDLbTBx_jymxcvFZ2rqn3Af.exe
      Filesize

      393KB

      MD5

      b0788093ab423639aefac4eb31d8a2d1

      SHA1

      35d5bfc9f3ff67a50558fccbe8b2c45eead03661

      SHA256

      6e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d

      SHA512

      7cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758

    • \Users\Admin\Pictures\Adobe Films\y5rcAXM6DSDdIIIIjOmdm8ws.exe
      Filesize

      365KB

      MD5

      14d1ed8606ad8a67bb9e8cabbac889cb

      SHA1

      682ae84172e9ada44fc0cd270769384159e7f162

      SHA256

      ba9e8bb18f192acac89f06ccce7e87b63128727bbaa7b3e1b2d95adb5449b853

      SHA512

      b1a999a9d7615a7fa98e048f3132b4b4a86b811173ce7e80da9eb6c57f1b8e6bfda73f16da3b3553d06c2ad33404ef0716ba0db8cf859564d0155ef694259a50

    • \Users\Admin\Pictures\Adobe Films\y5rcAXM6DSDdIIIIjOmdm8ws.exe
      Filesize

      365KB

      MD5

      14d1ed8606ad8a67bb9e8cabbac889cb

      SHA1

      682ae84172e9ada44fc0cd270769384159e7f162

      SHA256

      ba9e8bb18f192acac89f06ccce7e87b63128727bbaa7b3e1b2d95adb5449b853

      SHA512

      b1a999a9d7615a7fa98e048f3132b4b4a86b811173ce7e80da9eb6c57f1b8e6bfda73f16da3b3553d06c2ad33404ef0716ba0db8cf859564d0155ef694259a50

    • memory/804-63-0x0000000000000000-mapping.dmp
    • memory/928-66-0x0000000000000000-mapping.dmp
    • memory/2000-57-0x0000000000400000-0x000000000048F000-memory.dmp
      Filesize

      572KB

    • memory/2000-60-0x0000000005AB0000-0x0000000005ADE000-memory.dmp
      Filesize

      184KB

    • memory/2000-59-0x0000000003950000-0x0000000003BD4000-memory.dmp
      Filesize

      2.5MB

    • memory/2000-58-0x0000000000400000-0x000000000048F000-memory.dmp
      Filesize

      572KB

    • memory/2000-54-0x0000000075221000-0x0000000075223000-memory.dmp
      Filesize

      8KB

    • memory/2000-56-0x0000000000230000-0x0000000000263000-memory.dmp
      Filesize

      204KB

    • memory/2000-55-0x000000000065B000-0x0000000000677000-memory.dmp
      Filesize

      112KB