Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe
Resource
win10v2004-20220722-en
General
-
Target
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe
-
Size
164KB
-
MD5
4ab7f450124b7b4400bf866243d41a19
-
SHA1
37d2b935cfb5424f675aa707efc29e0a526a59f9
-
SHA256
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
-
SHA512
cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pkcs11.exepid Process 4272 pkcs11.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\WINE 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\WINE 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Windows\Currentversion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pkcs11.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\pkcs11.exe" svchost.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exesvchost.exepid Process 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe 4732 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exedescription pid Process Token: SeSecurityPrivilege 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exepkcs11.exedescription pid Process procid_target PID 4984 wrote to memory of 4272 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 74 PID 4984 wrote to memory of 4272 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 74 PID 4984 wrote to memory of 4272 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 74 PID 4984 wrote to memory of 5100 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 75 PID 4984 wrote to memory of 5100 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 75 PID 4984 wrote to memory of 5100 4984 573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe 75 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 4732 4272 pkcs11.exe 77 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78 PID 4272 wrote to memory of 5056 4272 pkcs11.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe"C:\Users\Admin\AppData\Local\Temp\573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f.exe"1⤵
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe"C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\pkcs11.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd176f3cbf.bat"2⤵PID:5100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313B
MD503f42a4c525151c599ea734bd23bcee5
SHA1977d7abc1306d9ac734e987372521dcb71aa75b5
SHA25603559d9842912458ae97f1b146df4a62b5e794140baee5b8f0e37766e96a2db6
SHA51274aa00b78ba629c9453a651251a722d461a874090ab1b347f5c759e499deb3f89f70a6b10db107e7f589ac18bf7159f7e5078ccd21d5540ca0b8e282b0e356d9
-
Filesize
164KB
MD54ab7f450124b7b4400bf866243d41a19
SHA137d2b935cfb5424f675aa707efc29e0a526a59f9
SHA256573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
SHA512cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c
-
Filesize
164KB
MD54ab7f450124b7b4400bf866243d41a19
SHA137d2b935cfb5424f675aa707efc29e0a526a59f9
SHA256573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
SHA512cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c