Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/10/2022, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe
Resource
win10v2004-20220812-en
General
-
Target
916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe
-
Size
223KB
-
MD5
9831b1092d9acaeb30351e1db30e8521
-
SHA1
3b25a4553abced0c237198335fd967f92ad86756
-
SHA256
916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd
-
SHA512
6a764462d4199306510fc8913e6ff9bb4f6f2db74a2a013abc407afd1fc1aefb4843ad2713227b5a9ec1aa74938e7286f817c8e021166c16ae35933e0d1faf8a
-
SSDEEP
6144:LUC2BeojrZsUYpsuxyRd/1qgcKvvTgfBso:XweojrZsUYpsuxQ/0gRvvTgf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2032 9100393150474F50.exe 1380 9100393150474F50.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\9100393150474F50\\9100393150474F50.exe" 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1488 set thread context of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 2032 set thread context of 1380 2032 9100393150474F50.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 9100393150474F50.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" 9100393150474F50.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" 9100393150474F50.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1488 wrote to memory of 1744 1488 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 28 PID 1744 wrote to memory of 2032 1744 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 29 PID 1744 wrote to memory of 2032 1744 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 29 PID 1744 wrote to memory of 2032 1744 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 29 PID 1744 wrote to memory of 2032 1744 916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe 29 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30 PID 2032 wrote to memory of 1380 2032 9100393150474F50.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe"C:\Users\Admin\AppData\Local\Temp\916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe"C:\Users\Admin\AppData\Local\Temp\916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\9100393150474F50\9100393150474F50.exe"C:\Users\Admin\AppData\Roaming\9100393150474F50\9100393150474F50.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\9100393150474F50\9100393150474F50.exe"C:\Users\Admin\AppData\Roaming\9100393150474F50\9100393150474F50.exe"4⤵
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
PID:1380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD59831b1092d9acaeb30351e1db30e8521
SHA13b25a4553abced0c237198335fd967f92ad86756
SHA256916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd
SHA5126a764462d4199306510fc8913e6ff9bb4f6f2db74a2a013abc407afd1fc1aefb4843ad2713227b5a9ec1aa74938e7286f817c8e021166c16ae35933e0d1faf8a
-
Filesize
223KB
MD59831b1092d9acaeb30351e1db30e8521
SHA13b25a4553abced0c237198335fd967f92ad86756
SHA256916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd
SHA5126a764462d4199306510fc8913e6ff9bb4f6f2db74a2a013abc407afd1fc1aefb4843ad2713227b5a9ec1aa74938e7286f817c8e021166c16ae35933e0d1faf8a
-
Filesize
223KB
MD59831b1092d9acaeb30351e1db30e8521
SHA13b25a4553abced0c237198335fd967f92ad86756
SHA256916c68203f329eaf00e0dbf5a7571107708ce037935b5f51d7eed41ad581cdfd
SHA5126a764462d4199306510fc8913e6ff9bb4f6f2db74a2a013abc407afd1fc1aefb4843ad2713227b5a9ec1aa74938e7286f817c8e021166c16ae35933e0d1faf8a