Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 00:25

General

  • Target

    573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe

  • Size

    164KB

  • MD5

    4ab7f450124b7b4400bf866243d41a19

  • SHA1

    37d2b935cfb5424f675aa707efc29e0a526a59f9

  • SHA256

    573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f

  • SHA512

    cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe
    "C:\Users\Admin\AppData\Local\Temp\573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe
      "C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4732
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe
        3⤵
          PID:5056
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd176f3cbf.bat"
        2⤵
          PID:5100

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\upd176f3cbf.bat
        Filesize

        313B

        MD5

        03f42a4c525151c599ea734bd23bcee5

        SHA1

        977d7abc1306d9ac734e987372521dcb71aa75b5

        SHA256

        03559d9842912458ae97f1b146df4a62b5e794140baee5b8f0e37766e96a2db6

        SHA512

        74aa00b78ba629c9453a651251a722d461a874090ab1b347f5c759e499deb3f89f70a6b10db107e7f589ac18bf7159f7e5078ccd21d5540ca0b8e282b0e356d9

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe
        Filesize

        164KB

        MD5

        4ab7f450124b7b4400bf866243d41a19

        SHA1

        37d2b935cfb5424f675aa707efc29e0a526a59f9

        SHA256

        573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f

        SHA512

        cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe
        Filesize

        164KB

        MD5

        4ab7f450124b7b4400bf866243d41a19

        SHA1

        37d2b935cfb5424f675aa707efc29e0a526a59f9

        SHA256

        573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f

        SHA512

        cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c

      • memory/4272-137-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/4272-133-0x0000000000000000-mapping.dmp
      • memory/4732-140-0x0000000000000000-mapping.dmp
      • memory/4732-142-0x0000000000750000-0x000000000077A000-memory.dmp
        Filesize

        168KB

      • memory/4732-144-0x0000000000750000-0x000000000077A000-memory.dmp
        Filesize

        168KB

      • memory/4984-132-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/4984-139-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/5056-141-0x0000000000000000-mapping.dmp
      • memory/5056-143-0x0000000000CB0000-0x0000000000CDA000-memory.dmp
        Filesize

        168KB

      • memory/5100-136-0x0000000000000000-mapping.dmp