Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 22:07

General

  • Target

    9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe

  • Size

    786KB

  • MD5

    054267b256c2cfdffe332832188dac70

  • SHA1

    22cbf8f49db96c04246071d9e811ee680469e19c

  • SHA256

    9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8

  • SHA512

    2ad6d3526efcfb14407b848906ffe28b8a8a569c72795c97adf3cc1a2e6d9774f6af989cbd9392064d149539482c51ce592afe1986b9a811cca1ae72bc0bc11b

  • SSDEEP

    6144:EBQgqTudbAZeNa5JXZ//0RQlTFQ8Ff2BzemM1EZ0wGHvItfxX7puI:EBQgqiSJJERQl5vd2BzFM1EKwGPI8I

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe
        "C:\Users\Admin\AppData\Local\Temp\9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\run.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1584
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
            4⤵
              PID:1544
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
              4⤵
                PID:1724

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\run.bat

          Filesize

          5KB

          MD5

          ad0d80bf6b4292dbada25f7f8fd6556c

          SHA1

          40133d1dea9905bf406fb88efcb57cd693e6cf43

          SHA256

          081f45a04b555b2406e5b63afbcdba4e564c3157e7d3720d21e8f53d2127bae1

          SHA512

          76eaacabecaaed7b4eb53fbc5db4d53b15ccdbe6526119346dc444e932cc1ebfffb74b0df3f54c85168d72082f9017802e9775bc178a58fcac0ab3c1ddb519cb

        • memory/1256-86-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-63-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-87-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-62-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-88-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-64-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-65-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-66-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-67-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-68-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-69-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-70-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-71-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-72-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-73-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-74-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-75-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-76-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-77-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-79-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-80-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-78-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-81-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-82-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-89-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-84-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-85-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-59-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-61-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-60-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-83-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-90-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-91-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-92-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-93-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-94-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-95-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-96-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-97-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-98-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-99-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-100-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-101-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-102-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-103-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-104-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-105-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-106-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-107-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-108-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-109-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-110-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-111-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1256-112-0x0000000001D80000-0x0000000001D81000-memory.dmp

          Filesize

          4KB

        • memory/1544-57-0x0000000000000000-mapping.dmp

        • memory/1584-55-0x0000000000000000-mapping.dmp

        • memory/1724-58-0x0000000000000000-mapping.dmp

        • memory/1800-54-0x00000000758C1000-0x00000000758C3000-memory.dmp

          Filesize

          8KB