Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 18:27

General

  • Target

    cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe

  • Size

    877KB

  • MD5

    4bb7a080bf38ec3e69175d1aaf246c70

  • SHA1

    d5bc9f95560f5ec58f0ceac46eb174225d5fa7cc

  • SHA256

    cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83

  • SHA512

    a9406653e0a9993652fd40864d09d56ac07e957cfd3ac0764e3fc6d764b75cd188a31b4be664080a363ffceb8a8ae21139b7be971e4088dcc3ebdacc7ca32522

  • SSDEEP

    12288:h1OgLdaO7uunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotx:h1OYdaOiuRx+oz5HVhuzAVoLHXtx

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe
    "C:\Users\Admin\AppData\Local\Temp\cab897da3c986715c3e4c2f84619f97b2405e204c37cdd479d5a21d1e7c0fd83.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\JYh1J.exe
      .\JYh1J.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp" /SL5="$10172,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:812
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:1412
          • C:\Program Files (x86)\consoleguard\consoleguard.exe
            "C:\Program Files (x86)\consoleguard\consoleguard.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Windows\SysWOW64\taskkill.exe
              "C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • C:\Program Files (x86)\consoleguard\proxyguard.ini

    Filesize

    2KB

    MD5

    516acf6dbd55cce18e3b4962d0f9dc6f

    SHA1

    37be9f61adfe4015d65649bfda4a73774ee1c6dc

    SHA256

    8f1794c5be77d4237d0f7c7b114ec113e6d0b9af994ab1beff103b8e4bdab62a

    SHA512

    b1cab8bf9e06a88de363ac882b5e59047dd3b101f117e36a88adaacb6ae51534c8c8f97ff9c4a4de1984599c9cc1c98318de48e0006690a325e6eff82b266242

  • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\JYh1J.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\JYh1J.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\proxyguard.ini

    Filesize

    2KB

    MD5

    516acf6dbd55cce18e3b4962d0f9dc6f

    SHA1

    37be9f61adfe4015d65649bfda4a73774ee1c6dc

    SHA256

    8f1794c5be77d4237d0f7c7b114ec113e6d0b9af994ab1beff103b8e4bdab62a

    SHA512

    b1cab8bf9e06a88de363ac882b5e59047dd3b101f117e36a88adaacb6ae51534c8c8f97ff9c4a4de1984599c9cc1c98318de48e0006690a325e6eff82b266242

  • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • C:\Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • \Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\JYh1J.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • \Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zSF7D7.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\is-O0H8I.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Users\Admin\AppData\Local\Temp\is-TJ78U.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-TJ78U.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1144-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1144-88-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1144-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1708-77-0x00000000743B1000-0x00000000743B3000-memory.dmp

    Filesize

    8KB

  • memory/1880-54-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB