Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 05:09
Behavioral task
behavioral1
Sample
d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe
Resource
win7-20220812-en
General
-
Target
d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe
-
Size
524KB
-
MD5
6c53c0eb989f30db89ea1b91fb449d9e
-
SHA1
1efbdc78a91f98cfc00b00f0633938cda0a0733d
-
SHA256
d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231
-
SHA512
b404cd76199ead886e99efc228537487ff8f7d3228c5891fb1fb59273d876622b306a59874e6740976939ef39506303da9f876935bb8bd6bc655271a8ca1ef78
-
SSDEEP
6144:g1F5oXpcFb5DRsNxIJU4DGJWHenNMyuZ6KfglZTTA1h9NVkD:UFmZcZlyNGU46W+wZ6KqA1hPVk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 TrustedInstaller.exe -
resource yara_rule behavioral2/memory/4332-132-0x000000004AD00000-0x000000004ADC0000-memory.dmp upx behavioral2/memory/4332-134-0x000000004AD00000-0x000000004ADC0000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\Q: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\T: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\U: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\I: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\J: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\M: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\N: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\R: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\Y: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\F: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\L: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\O: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\S: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\W: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\X: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\Z: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\E: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\G: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\H: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\P: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened (read-only) \??\V: d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\svchost.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File created \??\c:\windows\SysWOW64\msiexec.vir d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\serialver.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4332 d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe"C:\Users\Admin\AppData\Local\Temp\d677f28887b9c71aa1d23f92bf522b963d3435d79e242badd3ade46d68c48231.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de