Analysis

  • max time kernel
    32s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 06:25

General

  • Target

    4f4fcb2ba4ec57969a0dd7be28b13d8a1041878530bdcf546770db1353fffe02.exe

  • Size

    877KB

  • MD5

    6c5e25c0a06418934f60915e654ecac0

  • SHA1

    11d53cc056e56aba2e58ae16d4791b318897301a

  • SHA256

    4f4fcb2ba4ec57969a0dd7be28b13d8a1041878530bdcf546770db1353fffe02

  • SHA512

    c7767503d42c2dab4d1a0ba32df8f81c8116c9ea641277c0964474898e508dbcfb4eeb657efbb320e002a53d9b87617dec7bd93304402a6b42072f7123277035

  • SSDEEP

    12288:h1OgLdaOXuunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotA:h1OYdaO+uRx+oz5HVhuzAVoLHXtA

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f4fcb2ba4ec57969a0dd7be28b13d8a1041878530bdcf546770db1353fffe02.exe
    "C:\Users\Admin\AppData\Local\Temp\4f4fcb2ba4ec57969a0dd7be28b13d8a1041878530bdcf546770db1353fffe02.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\uwcSt.exe
      .\uwcSt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\is-037LO.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-037LO.tmp\setup.tmp" /SL5="$10172,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:672
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:1248
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:864
          • C:\Program Files (x86)\consoleguard\consoleguard.exe
            "C:\Program Files (x86)\consoleguard\consoleguard.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Windows\SysWOW64\taskkill.exe
              "C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • C:\Program Files (x86)\consoleguard\proxyguard.ini

    Filesize

    2KB

    MD5

    4d2b7814511501504efbc25a4a135e82

    SHA1

    a1b894c8538e0b0f91d57566a71874adcb928e6e

    SHA256

    60c5b34d51a78dfc6d47c67702b4b21d9a31be6392558dd655967424c022c706

    SHA512

    3c666f0e6ecbe4ac750e9f85aafa1c878eb51d73e8a1c77ba249136229b8debfb7ba54cf7b023554d95ce41e6bb764be94288381e5ad1c99ac9b012bdbd08a7b

  • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\proxyguard.ini

    Filesize

    2KB

    MD5

    4d2b7814511501504efbc25a4a135e82

    SHA1

    a1b894c8538e0b0f91d57566a71874adcb928e6e

    SHA256

    60c5b34d51a78dfc6d47c67702b4b21d9a31be6392558dd655967424c022c706

    SHA512

    3c666f0e6ecbe4ac750e9f85aafa1c878eb51d73e8a1c77ba249136229b8debfb7ba54cf7b023554d95ce41e6bb764be94288381e5ad1c99ac9b012bdbd08a7b

  • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\uwcSt.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\7zS313F.tmp\uwcSt.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\is-037LO.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • C:\Users\Admin\AppData\Local\Temp\is-037LO.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • \Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS313F.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS313F.tmp\uwcSt.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • \Users\Admin\AppData\Local\Temp\is-037LO.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Users\Admin\AppData\Local\Temp\is-BK3EO.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-BK3EO.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/672-76-0x0000000074BA1000-0x0000000074BA3000-memory.dmp

    Filesize

    8KB

  • memory/916-54-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB

  • memory/1960-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1960-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1960-88-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB