Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 23:36
Behavioral task
behavioral1
Sample
a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe
Resource
win7-20220812-en
General
-
Target
a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe
-
Size
166KB
-
MD5
91b1e654710732eccd11980675d1c041
-
SHA1
50ec91f716c0266f6a29f3f2677d763549546e50
-
SHA256
a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98
-
SHA512
4a27dfc400f8ac03caedb6d0da204508693f354729d95048f684a1613d65d950debc6611ddd61edfce7c033e781cb8b5d76ab6ea82f49d539544bfa1aaf24871
-
SSDEEP
3072:2Z1dkv4lIrZePbp2R+lEGVqBayszFaL8E13MswO9mpJoe7XMk3nngVByM:2vTp2R+lE8qYys3E133wG7erMkXgiM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4828 TrustedInstaller.exe -
resource yara_rule behavioral2/memory/3180-132-0x0000000001000000-0x0000000001068000-memory.dmp upx behavioral2/memory/3180-133-0x0000000001000000-0x0000000001068000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\K: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\M: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\V: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\Q: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\T: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\X: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\I: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\J: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\P: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\N: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\S: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\W: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\E: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\G: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\H: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\R: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\U: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\Y: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\F: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\L: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened (read-only) \??\O: a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\perfhost.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File created \??\c:\windows\SysWOW64\msiexec.vir a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3180 a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe"C:\Users\Admin\AppData\Local\Temp\a041a42a0e20dad766d9e832fe857bbb936db070adb5ffba636b29d6a4181c98.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de