Analysis

  • max time kernel
    204s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 09:24

General

  • Target

    trojan/9.exe

  • Size

    12.0MB

  • MD5

    84bb70a4861bffd2852ed7fe6e71ec9b

  • SHA1

    e25e727215abcd5317236d8919f85a6e251f8367

  • SHA256

    a44cc1193a4f20d0c1e94841b21b0bcfeec45a30dc68ba6eb68d0ea5aef6c942

  • SHA512

    42749e3034a2027cc658c03ec1ff7191d643bced89d887cfef5f84127d785fc3b948a1dade7db209fc5a5bb258de831d116e3ca46f8740540603937a1203e3f3

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\trojan\9.exe
    "C:\Users\Admin\AppData\Local\Temp\trojan\9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\trojan\NDRSTU54369LVG.7180882.2731677.System.52900.exe
      C:\Users\Admin\AppData\Local\Temp\trojan\\NDRSTU54369LVG.7180882.2731677.System.52900.exe
      2⤵
      • Executes dropped EXE
      PID:1884
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      PID:2020

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\trojan\NDRSTU54369LVG.7180882.2731677.System.52900.exe
    Filesize

    3.4MB

    MD5

    37caf406fe061351e4ce8f23bf122671

    SHA1

    b11d2e72ae284b3ea6c2019dbdfc05193c5ecec5

    SHA256

    854c298c121401b0f012aaa2dd895efcc3cd5c113cdbe4c0a7ef1c36a7de3d34

    SHA512

    5ed013deb27de8bd322444c4e1971f8c9d204001d0fc607e5c9a8f10432a2603c46090eca1e099609565f93e0ec19e14932799a57fa9636d7b7bdaee1f00f943

  • C:\Windows\svchost.exe
    Filesize

    8.6MB

    MD5

    577a87ffa171d9aca7d2feff94af70f1

    SHA1

    1d15652841e9b86748135070f8bcc2d9048125dc

    SHA256

    68f85c550888a8ef8e49eddae8020ad45aeeb15c961fbc55af08fe3e07dfda6e

    SHA512

    debd5e89eea4f0e7dcb70812675715e175e5e5f284f7c0b5475513cf54c7dfc5b58a1e9dd2a4cca64c592a673b3463cd224070da61b32c24bde48dccd89ab8e5

  • C:\Windows\svchost.exe
    Filesize

    8.6MB

    MD5

    577a87ffa171d9aca7d2feff94af70f1

    SHA1

    1d15652841e9b86748135070f8bcc2d9048125dc

    SHA256

    68f85c550888a8ef8e49eddae8020ad45aeeb15c961fbc55af08fe3e07dfda6e

    SHA512

    debd5e89eea4f0e7dcb70812675715e175e5e5f284f7c0b5475513cf54c7dfc5b58a1e9dd2a4cca64c592a673b3463cd224070da61b32c24bde48dccd89ab8e5

  • memory/1096-54-0x00000000752A1000-0x00000000752A3000-memory.dmp
    Filesize

    8KB

  • memory/2020-56-0x0000000000000000-mapping.dmp