Analysis

  • max time kernel
    58s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 18:27

General

  • Target

    17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe

  • Size

    877KB

  • MD5

    851409165412e9e5b284919980a57250

  • SHA1

    8787a10738dddac229a862a734fc2f412af90045

  • SHA256

    17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a

  • SHA512

    daf206266be7038684e769beb8f49ff7041c8c8520c74c08ad858adfb78355b9b4ac6f0d138b6eaa4d61e67807dbdb605cf0b6f3bc94098ee8f47654aa9868d6

  • SSDEEP

    12288:h1OgLdaOyuunhwyAcnpDcorrLWweor+SVhZJy5rzELMMzUDX3WsN1eotC:h1OYdaOluRx+oz5HVhuzAVoLHXtC

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe
    "C:\Users\Admin\AppData\Local\Temp\17dabc610f144083639d85e182110f570ec9b993583622b3a3bb5d4744baa54a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\wB7OT.exe
      .\wB7OT.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:596
        • C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp" /SL5="$1017A,249944,119296,C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" firewall add allowedprogram program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:1632
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=[in|out] program="C:\Program Files (x86)\consoleguard\consoleguard.exe" name="consoleguard" ENABLE ALL
            5⤵
            • Modifies Windows Firewall
            PID:1828
          • C:\Program Files (x86)\consoleguard\consoleguard.exe
            "C:\Program Files (x86)\consoleguard\consoleguard.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:240
            • C:\Windows\SysWOW64\taskkill.exe
              "C:\Windows\System32\taskkill.exe" /F /T /IM chrome.exe
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • C:\Program Files (x86)\consoleguard\proxyguard.ini

    Filesize

    2KB

    MD5

    06f1f80a222f90c9ca4db4f0fd80042e

    SHA1

    fcb06874371a192043adc4592f16726837883711

    SHA256

    3b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2

    SHA512

    fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec

  • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\proxyguard.ini

    Filesize

    2KB

    MD5

    06f1f80a222f90c9ca4db4f0fd80042e

    SHA1

    fcb06874371a192043adc4592f16726837883711

    SHA256

    3b80f4ffc3865169c5bccfe12d23072d026f9b503c0dbb3f39c6f140b565dcf2

    SHA512

    fc3edd437e81e3c6c1acc0d207bf788ffbd6507675905cb8d637815ed31434bb5939fe627116a33323458072b36cf4934e7e688029b5bd2a98192f93daf854ec

  • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\wB7OT.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\7zS3795.tmp\wB7OT.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • C:\Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Program Files (x86)\consoleguard\consoleguard.exe

    Filesize

    319KB

    MD5

    b2e3f929a5cb350908fd06f086e90bff

    SHA1

    9aa17bff2283d468fd6fb2a750ba69dee8359fda

    SHA256

    dfac458ea3008cde2392072040697964f76483918d4074d75b2275f25b7aa600

    SHA512

    53952912b60e6a88a6823a281d3487ac5caeac4a04c699f83085a42db53840f2edfc08de3bd7c97210124594b7f8a4ebc967500a90b458f4d26ed2c60ae83ca9

  • \Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS3795.tmp\setup.exe

    Filesize

    617KB

    MD5

    99e68acb7166064eea3a4ca1ce75fe9e

    SHA1

    1b62597bba2f21e7000cb5064531f2e193f51e2b

    SHA256

    0f844c06f4d8cf18534491856b4c0fdf3e2e71ef510d0e9f2f04a0944a57e0a6

    SHA512

    c3278007d6dee8aecf320a515dfb39b2a3afdb231c5f8e6c96fb1217df0e67ace5f0fe774e88ff9b4753ef62d1ed4a490e7be0861cb22604e6be16740aab27c6

  • \Users\Admin\AppData\Local\Temp\7zS3795.tmp\wB7OT.exe

    Filesize

    736KB

    MD5

    438ba275da9f74a5674206741cc9e412

    SHA1

    687845e36c0b914b8acda5229b88ce882fcae2db

    SHA256

    eada710a74778f6cba03b9c4cf3a3be0278724137e60e556c124c48d3187f384

    SHA512

    56d82e796e256f8d1b34bc790e048a770f9265b0d1fcd4d63d5e06d727266b949d9710fffcf14ea2c460e74c1ac4411537d52e670585e4580b25249c3170fbf9

  • \Users\Admin\AppData\Local\Temp\is-0KQN9.tmp\setup.tmp

    Filesize

    1.1MB

    MD5

    e4a2856522e6a817e3f0edd2677fa647

    SHA1

    7cffea7ad238e4d2a64238139ab64802dbaf1185

    SHA256

    e11132ca9fb98307830147446f5f731e19e308949e1a473d177d5a9f7ddf9c7e

    SHA512

    25df15be9123496ed7f798ef892da334cc347016fcede7a6d4d580871926b2396923d71db9fdf8773dbca7a33e03bf33774c4bf2c9837918d1411eead573d964

  • \Users\Admin\AppData\Local\Temp\is-BS6HP.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-BS6HP.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/596-88-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/596-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/596-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1724-76-0x0000000074591000-0x0000000074593000-memory.dmp

    Filesize

    8KB

  • memory/2004-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB