Analysis

  • max time kernel
    152s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 23:46

General

  • Target

    c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe

  • Size

    953KB

  • MD5

    a21ca40d709fe9093156e92618122130

  • SHA1

    d6da971eb88404954d8f791951a4858ad68d525c

  • SHA256

    c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593

  • SHA512

    92455276d861e91d3309bcda5a5d701d8599306a05f458642cfd9e41108f82a5ec9b3a559f15299a21c6083ac9a77b5146d4b3025990a2a12fb57d6b7a63093d

  • SSDEEP

    12288:NQnN/7YkrWBfWhvRhQUQYD7K4vX1ToviVg4UBLMHFVhHdJKXbmjlIPE/0v6Gfalk:NQnN/7DSBfWhQmnXQ85eLStwaIQMrW6

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe
    "C:\Users\Admin\AppData\Local\Temp\c2e059481a66c6e2d9bb51d05555d38e322ee0fad1cede5e0ddf50bf9b24d593.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3444
  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:4944
  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:620
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4088
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:1672
  • C:\Windows\System32\OpenSSH\ssh-agent.exe
    C:\Windows\System32\OpenSSH\ssh-agent.exe
    1⤵
    • Executes dropped EXE
    PID:2144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

    Filesize

    2.1MB

    MD5

    224b176dbf15ba11c36a55f53e3811e9

    SHA1

    53837904fd0792d423b1248a2caff869c37bcb8d

    SHA256

    cfc6046cf04bcfa64c10cb815aad40fd696af66224cbd9069c0e07c837105562

    SHA512

    d27d8ba4e9e931af8b095c7c278ef51b30cc9a16ec3054333bf0f95428fa33e19e07bfb16f2aa0cbe93356b59b94f59acccb492b83111ce18d23dadb87ba95a9

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    804KB

    MD5

    bf7969a395d3a68c29b0e6717e403b99

    SHA1

    2cc2d5bf462dd4b98333938bd140fa16a5e4cb20

    SHA256

    8a119e1d2c631347e5f74046bdf66654da5a9bf60d86d094a226d971fc59b276

    SHA512

    52c2ac254427a006432e99325cc7975020f3253e4b783d5f7c2caa8a78afe6af39b088011a9e13526d6eda61dbe0bdafe6853632ad854a876e218e36f10ebdf5

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    1.0MB

    MD5

    92879b29f475f89eb15970cee03648da

    SHA1

    afde8b707e93fa55dcddd876717930f329c3a959

    SHA256

    bac1761713df1592fa0e65321000c8d02e87759a1518556f3403a55e13c1a770

    SHA512

    aa4d172bd543412260123881e91cb19da8190d21d4f6251ace6bf630fa68e484b4d87679f9c28f918a816f7fcdeddce7158ef3d395e3a32ff5c954ba68a3163c

  • C:\Program Files\7-Zip\7zFM.exe

    Filesize

    1.4MB

    MD5

    183df7a5cef41c8f4e77a3caf0484c09

    SHA1

    0ccf4b1b38925012595f2502ab441ac55b351b6d

    SHA256

    e63585eb5e368830a207d106587b59155030a773598f798eeffde2653ada8ccb

    SHA512

    edc01e0315313f0883add14b6e046db243aa8e3ea5ce69c58c69b71154aa101cf36e4cf1f68c12b931e82e571c165075cec5db4b1c6068c29cb51c6acd3a5b08

  • C:\Program Files\7-Zip\7zG.exe

    Filesize

    1.1MB

    MD5

    813d1f2c57b1cc0667afcd329d87a0c0

    SHA1

    4c7f779027fa1e4e43a9e68a6dda34d788f24f26

    SHA256

    c0c429b741f8177682ebeb3f38b3393f906043e38380b63d088b4bb5f37a4cc8

    SHA512

    c5482280e3febaf97ef5e0665a17d0dccf4e699291c99838b6b2577feef0c6004381c85dd79ed0665e09d62ee3a524695babf999c9ce93d712e6d49fbf2b5258

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    587KB

    MD5

    a89938fabbb9062656ff8275bda11fc5

    SHA1

    7e6f6dd04f45647f7319a730c01f8970ed372552

    SHA256

    ea5fdddb0630b58d60661f697c3b8674f2ccd974bc62e3520e2dcca070c5c297

    SHA512

    785e743891db9e77c0ff887f899f6603f004f15f1151f12273074e4e8ff0aaddbe5b02522a5a91db92a8efa50aec19d06b43a21efb765c2d0c5b7c3464bd9ddd

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

    Filesize

    848KB

    MD5

    3c1e33ad54db871f244ac6179a567950

    SHA1

    7805732343a6bc550676d521c1b06968e8d6baba

    SHA256

    6dfa79901044881a1658fff7f2edbbc1bbeb5aeaa4f7d7ba80c27cd9920786ef

    SHA512

    0f0dff494f3a3caa4916d174ee798cbb379b4d523f0d43a7fe6815b703a42b41b34adc760f7bae875b62174f49b437bf30133dee529f18eb5fbf56a00792e1ea

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

    Filesize

    4.6MB

    MD5

    011c41309b518ed44c6557fb91c12397

    SHA1

    da276d3f2fb7e312f223edb49ec5eea12053e18f

    SHA256

    538c05a7535f31fa7ecfeaf787c402b66546d2d23762eee0b4e3a169a812166d

    SHA512

    74b17bd4df1146b79f890c8d75f7ae33fca621148d4e94d548fcf0c5c04a1b91d9af74664064e4eef473f2149b897b2a03ce0add678c59c82bba3547f1574a57

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe

    Filesize

    918KB

    MD5

    b6dbbd4d5a3bb6975b8793585fdc7f45

    SHA1

    fc1807d669cbd60cf39c937e72f211afd884da90

    SHA256

    49ee21d3d6d418b674391c49ba0ef0e09dedaf709cd9cf56e4423d5c14515e7f

    SHA512

    60ebe61457adf0421603d40902ff0ea58a7a334945bf0ed287ca1eba70081a3db5000b59e6d27b66e9978b060bbf1b1637ecb6bdbdb3e367c34f6603cebb7bd0

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe

    Filesize

    24.0MB

    MD5

    bd2da2f2d0c0bbcc113bbfc420e2b40c

    SHA1

    342323a75210ea792aa3e37603154e1b40bda7f6

    SHA256

    97244fa6e133c53d79eca5af3beec8e1d42b6520c2de95a264428fbcbeb2976a

    SHA512

    d1ffa0523f5269a2e48bb237cbeebeab8e36438bd4526d6de89e23766991efa2071baaa35a94973f66136dadf8c83135caec457b5b40f9ba356c2989b8466b83

  • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

    Filesize

    2.7MB

    MD5

    7f50e0f009542a38b8133f7577813846

    SHA1

    54ec6b5872a13678cdbf3bef86f12337c7b72747

    SHA256

    a4ded55ef3fdbdc58b7f08977d8cd1ca26984f9cd1298ddc70dfc94732610e52

    SHA512

    7e335f227f282ce3671d720827548e234a1984a15e4d74f6007cad3eae9f45ab47e97e41dca299dc93e3b97d7f5561bcb3f11b0517baa78057a6782ee15b87ac

  • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    813KB

    MD5

    4396d18453bc77ddca85a394173a6818

    SHA1

    3878e62e30676ffd6b9e44ebd50d96bf62c53b97

    SHA256

    37fef24eb000094702fc97c7a2589dc351646b59b9aa3cc4a857361727cf58e5

    SHA512

    e02b36fe6b4cbfe93e899a71e4ac82407914814647929e74b76e37955b0d2e612175be9e22acaf1b77272480ac0542f823776ab7d99431b5afff8bc01ccc966f

  • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe

    Filesize

    2.0MB

    MD5

    f4c20d5d036e50a853ad949f3e678b66

    SHA1

    9ab8d60c17c242ac0fbe5e74ebc5c76df0b2de35

    SHA256

    21792db87fa05261f1e874db0bcb100bdb4165cfd173cfc694c1e318b7db2337

    SHA512

    d2cdda50c9f85a7433f00e32c62711f86410dc4ee5ad1427e0843f88a52c151fd8c99d659f9a57b13321034365fc44522e29808208f48bfb21aec37760141c48

  • C:\Windows\System32\OpenSSH\ssh-agent.exe

    Filesize

    948KB

    MD5

    2e50ac1e696020646025d9e6840ab64f

    SHA1

    cfa3f825f3d6c762dd60cb62b6a53236dfccb789

    SHA256

    7dad320a36df48774a20be9edeff93d77f8a5867c72bdb05ccb61314112b9d10

    SHA512

    6a83e60b3c5e64a97f79c29bb58728045b415af3219d72abe6538d639ca08ec8037872a06a9f360ca4a30b1e18ce496ee8b645ac4235fcd4b8a2659e307eeb22

  • C:\Windows\System32\OpenSSH\ssh-agent.exe

    Filesize

    948KB

    MD5

    2e50ac1e696020646025d9e6840ab64f

    SHA1

    cfa3f825f3d6c762dd60cb62b6a53236dfccb789

    SHA256

    7dad320a36df48774a20be9edeff93d77f8a5867c72bdb05ccb61314112b9d10

    SHA512

    6a83e60b3c5e64a97f79c29bb58728045b415af3219d72abe6538d639ca08ec8037872a06a9f360ca4a30b1e18ce496ee8b645ac4235fcd4b8a2659e307eeb22

  • C:\odt\office2016setup.exe

    Filesize

    5.6MB

    MD5

    27366a73a123b190a38f4cb51ae4a3c3

    SHA1

    88b6fb9e23be33b80b33a052fca0b762450a5c5d

    SHA256

    c142ca02a1a8fff67056951ed9c870f0721a441eff66f1f51c9b15542833b1cf

    SHA512

    caf9998e680eef2ad6e61fd803c71175e037238504692647972029f15de86b536c1d29f079795b14e2d53e8c312fb13130f6282fc996d6c97b0881df2e6799a0

  • \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe

    Filesize

    804KB

    MD5

    bf7969a395d3a68c29b0e6717e403b99

    SHA1

    2cc2d5bf462dd4b98333938bd140fa16a5e4cb20

    SHA256

    8a119e1d2c631347e5f74046bdf66654da5a9bf60d86d094a226d971fc59b276

    SHA512

    52c2ac254427a006432e99325cc7975020f3253e4b783d5f7c2caa8a78afe6af39b088011a9e13526d6eda61dbe0bdafe6853632ad854a876e218e36f10ebdf5

  • \??\c:\program files\windows media player\wmpnetwk.exe

    Filesize

    1.5MB

    MD5

    f345ee01b8f79bae416f7c33796a5d42

    SHA1

    a5b32d2e320d8a88ba8ece64752ebe3fab694a15

    SHA256

    013391e9fba9ae9ab1c2d6152c40bb56b34563116e3346720500874c8853a6d2

    SHA512

    d3f96e498d6ca8aefada2ce0b70c7149fba296c65e51a8cb6b4b4f867036396c413cfaf2b34aed30a0c72771b523461c9e4e71aee2600e7594a9185a67d44000

  • \??\c:\windows\system32\Agentservice.exe

    Filesize

    1.7MB

    MD5

    ba99e96057da80217bda9afdf8929f3d

    SHA1

    748743baf53aa48455bee7df0445b166da26a96c

    SHA256

    1324c1f5b2636d5ceccb65f098bd29f81642cacbf462dd474370fcf8e913d546

    SHA512

    6beac06fca87a36fadb97b710a6fa95180803ae7af14454810cd7b76ec406f14758fd2a3e8e538389300af9e874dfcc9390980b9afee2c4cb71ab51bca3da472

  • \??\c:\windows\system32\Appvclient.exe

    Filesize

    1.3MB

    MD5

    52911badaa913bbee5a2e204ade8d5c0

    SHA1

    71e77609b58d93e07539f88ac870baffaaf83bd2

    SHA256

    a00609ea27df589f546c9e5a0ad6a48cece52f85bed45e6d5a03a6d601d7e972

    SHA512

    74f52c65f028fc044174d0f7e0e461c8f44f58baab2412ddf5e30f682b8fc7449350ee2c6755b6dc79ba9ca27799b5eef0ad67184de0a26d103503b6c44ab1bc

  • \??\c:\windows\system32\fxssvc.exe

    Filesize

    1.2MB

    MD5

    4f086c256c2938e304b6b8f1612c690c

    SHA1

    270ea7cee6e76c1fcad081d56b25304cfe2a68f2

    SHA256

    8f5c28504703554ab8c55c6e1cc3b6f7d8ca4e53e7965e3b14c8c718658796ee

    SHA512

    84bc49beb1dbe1a98dc941fee9ceaf7cd9843d44915f1116a628ee442eda0290108332cb263960f95d25bac4ed5f548a6e7d940f630335742b2d5d3ffe0835b7

  • \??\c:\windows\system32\msdtc.exe

    Filesize

    720KB

    MD5

    1e942d9355c1af414883bae097c6b56b

    SHA1

    2022728385e0dd83d4619f257c230f5643140218

    SHA256

    9de72447bd2a25668cd619cc7dbdf31fdc16e9199029e4c5023d63ce54dd9172

    SHA512

    fae951a92bd6497a976fdac4fa6d77c85b35c0da8789ba3d16aed48a7ff2a15e04fba1ef180074865abbc1b89556518e89179a8be2cce2d3904aa16d86a9842c

  • \??\c:\windows\system32\msiexec.exe

    Filesize

    643KB

    MD5

    be97605419891a004b6d0c065dac5486

    SHA1

    56f470f7b8efb8567ef943abee035a029520db4b

    SHA256

    adcc2d22eba27d033dccb4e4e122f0e0a97b11baa5384869aa689bc780dbc7f6

    SHA512

    5e17acc573936341e992574e657b5ff77d5c3ed029a7554ed5691db45ce14758540611dc831dc0feaabd7498c4934672a9937871e7f611a6568b711015db75d4

  • \??\c:\windows\system32\snmptrap.exe

    Filesize

    592KB

    MD5

    60ac0ea6273f1b595af63630bbd67b68

    SHA1

    b1f8482c83c85fe41819f7877620376e1788c521

    SHA256

    17984c3a8f36bf3a52097a3de6a5df430f072738da787764803151854331484d

    SHA512

    d6ca46b7a2454c5147341b4bd7b18a5a9c566ac55f48df7caac2d9d1f33d3ed5c20f1298567c7e9085a0db494d45fbcc8bc06034177392ba2394bf7b6aef6078

  • \??\c:\windows\system32\wbengine.exe

    Filesize

    2.1MB

    MD5

    0573be26c8c7470f7242f18c5e7f2452

    SHA1

    bf607fa854a4ac1e695dcbaa7dad0d59d597e14b

    SHA256

    9563eac53b9dcfb9f3283796d92115ac19a4e09d2a381f12f2671d2bb423498b

    SHA512

    6e37f5d604cc94d7761eda1324043e231391d5b24e546e26fc9db5bb2ec644260a22c2a32830f3a36ab046741a5d496c3a616c08da9e862c704130bcefbded4b

  • memory/620-155-0x0000000140000000-0x000000014041A000-memory.dmp

    Filesize

    4.1MB

  • memory/620-140-0x0000000140000000-0x000000014041A000-memory.dmp

    Filesize

    4.1MB

  • memory/1672-156-0x0000000140000000-0x00000001402BE000-memory.dmp

    Filesize

    2.7MB

  • memory/1672-141-0x0000000140000000-0x00000001402BE000-memory.dmp

    Filesize

    2.7MB

  • memory/2144-157-0x0000000140000000-0x00000001402F1000-memory.dmp

    Filesize

    2.9MB

  • memory/2144-144-0x0000000140000000-0x00000001402F1000-memory.dmp

    Filesize

    2.9MB

  • memory/3444-132-0x000000004AD00000-0x000000004AFB2000-memory.dmp

    Filesize

    2.7MB

  • memory/3444-133-0x000000004AD00000-0x000000004AFB2000-memory.dmp

    Filesize

    2.7MB

  • memory/4088-139-0x0000000140000000-0x00000001402BE000-memory.dmp

    Filesize

    2.7MB

  • memory/4944-154-0x0000000140000000-0x00000001403FD000-memory.dmp

    Filesize

    4.0MB

  • memory/4944-135-0x0000000140000000-0x00000001403FD000-memory.dmp

    Filesize

    4.0MB