Analysis

  • max time kernel
    151s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 04:50

General

  • Target

    7b5c2a5b9f4d9669613d2d640021feefba35fbbc43b0c9e955da54f545e4d322.exe

  • Size

    906KB

  • MD5

    279e4d49ee709d3e740cbf1a11a53210

  • SHA1

    5243a029f96c61d496f70d0977941858b7cf7842

  • SHA256

    7b5c2a5b9f4d9669613d2d640021feefba35fbbc43b0c9e955da54f545e4d322

  • SHA512

    11358f1fdd14a8bd303464ce7d6af286f036d44ccd965dd9a6928efcc6b01a43e4645b26f3a61d3aadce4ed64d56b8916d179a777625aa7d37868f3daddec6cc

  • SSDEEP

    24576:ZePmbZpwZloMwvCvdoDzMPLIrv0+M6t4fXdV+7:7bZDMwqCHMPLIzftgD6

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Sets service image path in registry 2 TTPs 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\7b5c2a5b9f4d9669613d2d640021feefba35fbbc43b0c9e955da54f545e4d322.exe
        "C:\Users\Admin\AppData\Local\Temp\7b5c2a5b9f4d9669613d2d640021feefba35fbbc43b0c9e955da54f545e4d322.exe"
        2⤵
        • Sets service image path in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\060452.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
            4⤵
              PID:388
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
              4⤵
                PID:1740
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C C:\Windows\SysWOW64\060459.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:692
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
                4⤵
                  PID:1376
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
                  4⤵
                    PID:1776

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\060452.bat

              Filesize

              5KB

              MD5

              ebeff7b70bc4dcc47b4424ee6472e123

              SHA1

              de26d8e8042b27b4e43c721a52eb61f30b7abf35

              SHA256

              fd2242eef0d6adc82b68e9b57e52ebccdc5fe636ab7f9d345ddfcca72f1cf82d

              SHA512

              49fac33297d33d0c3f7f67546a50a2c0b7bfd2f36ed6658097aba9eeac4231ceb0de3c5e41c54ec703bbe47a081925d8df41e74aae6626a2bf253fe8fa4e5230

            • C:\Windows\SysWOW64\060459.bat

              Filesize

              5KB

              MD5

              ebeff7b70bc4dcc47b4424ee6472e123

              SHA1

              de26d8e8042b27b4e43c721a52eb61f30b7abf35

              SHA256

              fd2242eef0d6adc82b68e9b57e52ebccdc5fe636ab7f9d345ddfcca72f1cf82d

              SHA512

              49fac33297d33d0c3f7f67546a50a2c0b7bfd2f36ed6658097aba9eeac4231ceb0de3c5e41c54ec703bbe47a081925d8df41e74aae6626a2bf253fe8fa4e5230

            • \Users\Admin\AppData\Local\Temp\BmuCHr\KwCswmJ.dll

              Filesize

              773KB

              MD5

              0e498f536fcbc7a3add7ae32e6a2bc6e

              SHA1

              aa648d515617bde237b59ff593da1180c870efb3

              SHA256

              0de3d25cfad28e2dcb7f1307f71b96db79a8fe1538d0138c459bddc31ab47aab

              SHA512

              ea7abade1caca6ac8bda273590d39b1989912c3e609453a1997e0c5b6aac8e369964697982f32a8bb1b7b0e8856818df6fd08aa31b6752533d557ce204e6e849

            • \Users\Admin\AppData\Local\Temp\BmuCHr\mnJKFBr.dll

              Filesize

              722KB

              MD5

              66e759f5a8fc8309172b6cd4607abf59

              SHA1

              24ea256f05e5fbd037c5f0bb2eaeb53bb3819c84

              SHA256

              40eea7eef6204133069ca3d20ce80d88ed7b1a29e205566d38aa18da01de9211

              SHA512

              872b0e153aab1831aa35c91390d1c8b9d06d1f9376c84fa3f22de8e4f7f334062e23e7dcd04d9af97d0e78fdcf4efdfbc6ea85db4c50093b1296d849c5a10093

            • \Windows\SysWOW64\HDlxwD.dll

              Filesize

              68KB

              MD5

              39bf6058fea574fe9cf529cb2823f787

              SHA1

              9103b0c11bdeef0e8a2f26b0d10043483ac9f7d8

              SHA256

              3bef0084ac397ea27cd7f5cc0b4ea8119cd8f94f607e2a814db51918bc1e1fbe

              SHA512

              4aa3a5c16dfc78378945dc03e29a5db161dd75493d757d5fa285fb6bea8bf824a50cf27d57eaed4d3dbc07e9f272d51a3c2a5efa6d924237d90f7f0fbc8364e4

            • \Windows\SysWOW64\yEwpnu.dll

              Filesize

              68KB

              MD5

              cd57d686eaaea8891dd0e55fb0bc510d

              SHA1

              634c819d7751630bad82a7d1ac98b9cd15f3c00c

              SHA256

              2d84b48728765d01a1392af0046644789f6db00997c95182a11536329e65f1bc

              SHA512

              58aa9d03a748eb7f0b38b8cdc70b430aa3983f86c2d6479eec161f8277ba8a8467afbe0876dc7fb0534bb0574aa40ca3da4f200ee871177e623996ef6f04ae27

            • memory/1736-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

              Filesize

              8KB

            • memory/1736-67-0x0000000074080000-0x00000000740A7000-memory.dmp

              Filesize

              156KB

            • memory/1736-68-0x0000000074050000-0x0000000074077000-memory.dmp

              Filesize

              156KB