Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 22:07

General

  • Target

    9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe

  • Size

    786KB

  • MD5

    054267b256c2cfdffe332832188dac70

  • SHA1

    22cbf8f49db96c04246071d9e811ee680469e19c

  • SHA256

    9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8

  • SHA512

    2ad6d3526efcfb14407b848906ffe28b8a8a569c72795c97adf3cc1a2e6d9774f6af989cbd9392064d149539482c51ce592afe1986b9a811cca1ae72bc0bc11b

  • SSDEEP

    6144:EBQgqTudbAZeNa5JXZ//0RQlTFQ8Ff2BzemM1EZ0wGHvItfxX7puI:EBQgqiSJJERQl5vd2BzFM1EKwGPI8I

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe
        "C:\Users\Admin\AppData\Local\Temp\9119d27278482c821e678a23ee441d180370cdaa9e94ecfff3ee60fed868ffc8.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\run.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
            4⤵
              PID:852
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
              4⤵
                PID:4996

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\neyq.dll

                Filesize

                337KB

                MD5

                1ac7aa2455c133122d4f632dab0848d2

                SHA1

                0642f1f41cb512ab6a76fa1d8f0b9713ebddec9c

                SHA256

                1dd7050daa3fcc30d44fda4b5ce3bc8a6e8e7636dceff3b53257d85d6721f352

                SHA512

                fa6606d3b501d87ba482b8c258df9739f8b9c96de64dd10d9afb0bccd567fe8880732db9c42d5c2d8e73263287c53c5c31c3217eb8ca30068bde8b0a5fca6a2e

              • C:\Windows\run.bat

                Filesize

                5KB

                MD5

                ad0d80bf6b4292dbada25f7f8fd6556c

                SHA1

                40133d1dea9905bf406fb88efcb57cd693e6cf43

                SHA256

                081f45a04b555b2406e5b63afbcdba4e564c3157e7d3720d21e8f53d2127bae1

                SHA512

                76eaacabecaaed7b4eb53fbc5db4d53b15ccdbe6526119346dc444e932cc1ebfffb74b0df3f54c85168d72082f9017802e9775bc178a58fcac0ab3c1ddb519cb