Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2022 21:50

General

  • Target

    81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a.exe

  • Size

    227KB

  • MD5

    51e5a087d3ef2140a2b4b921cec3de42

  • SHA1

    2b4bc51bc96cf3cbf50ffe03b5819fb812a34c19

  • SHA256

    81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a

  • SHA512

    9a23fe082db3896cc1a268fde0fefb16d495a563708171cb475afd4148f56877ee777bf2edf8bd9a9f630322d4bebd2be5518166c7d47a9d823f78a4498f4f1f

  • SSDEEP

    3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRmRuq:ZR5IuMQoseGk7RZBGxAycKpSPX2Fq

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a.exe
    "C:\Users\Admin\AppData\Local\Temp\81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe
      "C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:568
      • \??\c:\windows\microsoft.net\framework\v2.0.50727\InstallUtil.exe
        "c:\windows\microsoft.net\framework\v2.0.50727\\InstallUtil.exe" C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1892
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /tn Admin /tr "\"C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe\" arguments" /sc MINUTE /mo 1
        3⤵
        • Creates scheduled task(s)
        PID:1972
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
        PID:1476
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a.exe" && del "C:\Users\Admin\AppData\Local\Temp\81afd25a71243d161133a5eed7100c93ea9035019b54d604b0b1b81052ee975a.exe.config"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\system32\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:652
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1752
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {28FF882B-63E6-4876-BE37-A062D9612225} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe
          C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe arguments
          2⤵
          • Executes dropped EXE
          PID:848
        • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe
          C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe arguments
          2⤵
          • Executes dropped EXE
          PID:904

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe

        Filesize

        227KB

        MD5

        5c0d97618ae9a791191badd14c914df2

        SHA1

        3b20aa145232fca0c0224b7d5984bd81445c1b44

        SHA256

        d83e85ff5f16361074f50f9601d4e2653cb6e26e184f415447416fddd8c42ccb

        SHA512

        8fb57830ffdcb6613cfb27f90d65a20c578fa8fb711ff193cbe4ed4fa2dd75ef4635267466aba51c9bcdab94e2bca05aab222678e54af17842dfb3f441abbc0e

      • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe

        Filesize

        227KB

        MD5

        5c0d97618ae9a791191badd14c914df2

        SHA1

        3b20aa145232fca0c0224b7d5984bd81445c1b44

        SHA256

        d83e85ff5f16361074f50f9601d4e2653cb6e26e184f415447416fddd8c42ccb

        SHA512

        8fb57830ffdcb6613cfb27f90d65a20c578fa8fb711ff193cbe4ed4fa2dd75ef4635267466aba51c9bcdab94e2bca05aab222678e54af17842dfb3f441abbc0e

      • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe

        Filesize

        227KB

        MD5

        5c0d97618ae9a791191badd14c914df2

        SHA1

        3b20aa145232fca0c0224b7d5984bd81445c1b44

        SHA256

        d83e85ff5f16361074f50f9601d4e2653cb6e26e184f415447416fddd8c42ccb

        SHA512

        8fb57830ffdcb6613cfb27f90d65a20c578fa8fb711ff193cbe4ed4fa2dd75ef4635267466aba51c9bcdab94e2bca05aab222678e54af17842dfb3f441abbc0e

      • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe

        Filesize

        227KB

        MD5

        5c0d97618ae9a791191badd14c914df2

        SHA1

        3b20aa145232fca0c0224b7d5984bd81445c1b44

        SHA256

        d83e85ff5f16361074f50f9601d4e2653cb6e26e184f415447416fddd8c42ccb

        SHA512

        8fb57830ffdcb6613cfb27f90d65a20c578fa8fb711ff193cbe4ed4fa2dd75ef4635267466aba51c9bcdab94e2bca05aab222678e54af17842dfb3f441abbc0e

      • C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\format32.exe.config

        Filesize

        1KB

        MD5

        dd3d04c365984b4ec57a80503f81fddf

        SHA1

        c55fbcb61818e47dac9aae465faff91f0805bd7c

        SHA256

        40a59ca9744dc3d4647f246b2dc553f37f8095418c1b48a9bd94cdb5c03dbc5c

        SHA512

        0dd459def2abe9e3f0d1251049a0755c63f7dd3d85e91dba272c3f479f2578e3f3f2379e1cd6913190f7f596af721201eb5d9423ab28aed72bde5cd3cac7f785

      • memory/568-66-0x0000000001E36000-0x0000000001E55000-memory.dmp

        Filesize

        124KB

      • memory/568-56-0x0000000000000000-mapping.dmp

      • memory/568-61-0x000007FEF3890000-0x000007FEF42B3000-memory.dmp

        Filesize

        10.1MB

      • memory/568-64-0x000007FEF2110000-0x000007FEF31A6000-memory.dmp

        Filesize

        16.6MB

      • memory/568-67-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp

        Filesize

        8KB

      • memory/568-82-0x0000000001E36000-0x0000000001E55000-memory.dmp

        Filesize

        124KB

      • memory/640-62-0x0000000000000000-mapping.dmp

      • memory/652-65-0x0000000000000000-mapping.dmp

      • memory/848-84-0x0000000000000000-mapping.dmp

      • memory/904-92-0x0000000001FE6000-0x0000000002005000-memory.dmp

        Filesize

        124KB

      • memory/904-91-0x0000000001FE6000-0x0000000002005000-memory.dmp

        Filesize

        124KB

      • memory/904-89-0x000007FEF2110000-0x000007FEF31A6000-memory.dmp

        Filesize

        16.6MB

      • memory/904-88-0x000007FEF3890000-0x000007FEF42B3000-memory.dmp

        Filesize

        10.1MB

      • memory/904-86-0x0000000000000000-mapping.dmp

      • memory/996-63-0x0000000002006000-0x0000000002025000-memory.dmp

        Filesize

        124KB

      • memory/996-54-0x000007FEF3890000-0x000007FEF42B3000-memory.dmp

        Filesize

        10.1MB

      • memory/996-55-0x000007FEF2110000-0x000007FEF31A6000-memory.dmp

        Filesize

        16.6MB

      • memory/1476-59-0x0000000000000000-mapping.dmp

      • memory/1892-73-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-80-0x0000000074650000-0x0000000074BFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1892-83-0x0000000074650000-0x0000000074BFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1892-79-0x00000000760E1000-0x00000000760E3000-memory.dmp

        Filesize

        8KB

      • memory/1892-78-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-76-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-68-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-69-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-71-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1892-74-0x000000000040334E-mapping.dmp

      • memory/1892-72-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/1972-81-0x0000000000000000-mapping.dmp