Analysis
-
max time kernel
191s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 08:25
Static task
static1
Behavioral task
behavioral1
Sample
7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe
Resource
win10v2004-20220812-en
General
-
Target
7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe
-
Size
293KB
-
MD5
3138b27c92313e95ad7faa175b1b0170
-
SHA1
fd846b03aa6a95d3a132e7b2cfe62926a8a7119c
-
SHA256
7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b
-
SHA512
7f6aa28c8b6389da7281e555cee4f42d3d3e7b14a08ff9b9ae1daa20aa72fe5a428fc15586c85e9bb43c68b9c5c8643364d6fdea749c9bae3b1a8ef1b8d8d72c
-
SSDEEP
6144:Y2EABmlDWhTbaqoJipBoYiWvRu1wjHXFjjy76oLjGB6s:Y5ABmBEaEvReojs6oC6s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4800 ehbav.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\Currentversion\Run ehbav.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\Currentversion\Run ehbav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fabaydpaa = "C:\\Users\\Admin\\AppData\\Roaming\\Asqoo\\ehbav.exe" ehbav.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 848 set thread context of 3476 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe 83 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Privacy 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe 4800 ehbav.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe Token: SeSecurityPrivilege 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 4800 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe 82 PID 848 wrote to memory of 4800 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe 82 PID 848 wrote to memory of 4800 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe 82 PID 4800 wrote to memory of 2340 4800 ehbav.exe 23 PID 4800 wrote to memory of 2340 4800 ehbav.exe 23 PID 4800 wrote to memory of 2340 4800 ehbav.exe 23 PID 4800 wrote to memory of 2340 4800 ehbav.exe 23 PID 4800 wrote to memory of 2340 4800 ehbav.exe 23 PID 4800 wrote to memory of 2352 4800 ehbav.exe 24 PID 4800 wrote to memory of 2352 4800 ehbav.exe 24 PID 4800 wrote to memory of 2352 4800 ehbav.exe 24 PID 4800 wrote to memory of 2352 4800 ehbav.exe 24 PID 4800 wrote to memory of 2352 4800 ehbav.exe 24 PID 4800 wrote to memory of 2448 4800 ehbav.exe 59 PID 4800 wrote to memory of 2448 4800 ehbav.exe 59 PID 4800 wrote to memory of 2448 4800 ehbav.exe 59 PID 4800 wrote to memory of 2448 4800 ehbav.exe 59 PID 4800 wrote to memory of 2448 4800 ehbav.exe 59 PID 4800 wrote to memory of 3036 4800 ehbav.exe 27 PID 4800 wrote to memory of 3036 4800 ehbav.exe 27 PID 4800 wrote to memory of 3036 4800 ehbav.exe 27 PID 4800 wrote to memory of 3036 4800 ehbav.exe 27 PID 4800 wrote to memory of 3036 4800 ehbav.exe 27 PID 4800 wrote to memory of 3136 4800 ehbav.exe 51 PID 4800 wrote to memory of 3136 4800 ehbav.exe 51 PID 4800 wrote to memory of 3136 4800 ehbav.exe 51 PID 4800 wrote to memory of 3136 4800 ehbav.exe 51 PID 4800 wrote to memory of 3136 4800 ehbav.exe 51 PID 4800 wrote to memory of 3352 4800 ehbav.exe 50 PID 4800 wrote to memory of 3352 4800 ehbav.exe 50 PID 4800 wrote to memory of 3352 4800 ehbav.exe 50 PID 4800 wrote to memory of 3352 4800 ehbav.exe 50 PID 4800 wrote to memory of 3352 4800 ehbav.exe 50 PID 4800 wrote to memory of 3452 4800 ehbav.exe 49 PID 4800 wrote to memory of 3452 4800 ehbav.exe 49 PID 4800 wrote to memory of 3452 4800 ehbav.exe 49 PID 4800 wrote to memory of 3452 4800 ehbav.exe 49 PID 4800 wrote to memory of 3452 4800 ehbav.exe 49 PID 4800 wrote to memory of 3524 4800 ehbav.exe 28 PID 4800 wrote to memory of 3524 4800 ehbav.exe 28 PID 4800 wrote to memory of 3524 4800 ehbav.exe 28 PID 4800 wrote to memory of 3524 4800 ehbav.exe 28 PID 4800 wrote to memory of 3524 4800 ehbav.exe 28 PID 4800 wrote to memory of 3608 4800 ehbav.exe 48 PID 4800 wrote to memory of 3608 4800 ehbav.exe 48 PID 4800 wrote to memory of 3608 4800 ehbav.exe 48 PID 4800 wrote to memory of 3608 4800 ehbav.exe 48 PID 4800 wrote to memory of 3608 4800 ehbav.exe 48 PID 4800 wrote to memory of 3888 4800 ehbav.exe 46 PID 4800 wrote to memory of 3888 4800 ehbav.exe 46 PID 4800 wrote to memory of 3888 4800 ehbav.exe 46 PID 4800 wrote to memory of 3888 4800 ehbav.exe 46 PID 4800 wrote to memory of 3888 4800 ehbav.exe 46 PID 4800 wrote to memory of 4664 4800 ehbav.exe 44 PID 4800 wrote to memory of 4664 4800 ehbav.exe 44 PID 4800 wrote to memory of 4664 4800 ehbav.exe 44 PID 4800 wrote to memory of 4664 4800 ehbav.exe 44 PID 4800 wrote to memory of 4664 4800 ehbav.exe 44 PID 4800 wrote to memory of 848 4800 ehbav.exe 80 PID 4800 wrote to memory of 848 4800 ehbav.exe 80 PID 4800 wrote to memory of 848 4800 ehbav.exe 80 PID 4800 wrote to memory of 848 4800 ehbav.exe 80 PID 4800 wrote to memory of 848 4800 ehbav.exe 80 PID 848 wrote to memory of 3476 848 7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe 83
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe"C:\Users\Admin\AppData\Local\Temp\7ad55cd8adc9df4f0f8ae3e7d6844091c712fb94a2c0a0915890f49e9b21ed3b.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\Asqoo\ehbav.exe"C:\Users\Admin\AppData\Roaming\Asqoo\ehbav.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp02b75c5f.bat"3⤵PID:3476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4876
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4664
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3888
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3608
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3452
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3136
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5236fec1f9e67bfa7c68a1766f771fef5
SHA15c0e9facea292d46aa567ea50ad3f5fc17623ce8
SHA2566ca61d0a8ae6f5107de71539294777ff154f6ebcedca76e6bf72bc1c15471d6e
SHA512a501d4f95eff18cd63c69a2c0d775cf121381fa809a51995d97c7fd6158b6582fabd8ab9e4fd04de4b7ae7cd9d9a7d18e4cebf4ea9de6bb5cbf10f55b55f3b45
-
Filesize
293KB
MD5236fec1f9e67bfa7c68a1766f771fef5
SHA15c0e9facea292d46aa567ea50ad3f5fc17623ce8
SHA2566ca61d0a8ae6f5107de71539294777ff154f6ebcedca76e6bf72bc1c15471d6e
SHA512a501d4f95eff18cd63c69a2c0d775cf121381fa809a51995d97c7fd6158b6582fabd8ab9e4fd04de4b7ae7cd9d9a7d18e4cebf4ea9de6bb5cbf10f55b55f3b45
-
Filesize
2KB
MD5027ba22bcced6a256180775dbeb7f25b
SHA1c51b8b48a215d95e88482c999cbcc189860d64e4
SHA256e6d6b9bdb140ac0891d75b081e003a449f638fcb54154950f268b12a0098cb8f
SHA512796849ffc65c6044e7f1dfcf8a2361bf73716dfe7e2fd3320896bb2d61d8a477804d284f627cbf1900c229ba0f0075f783c7cdc843dfa3c085c2e0865a8ab5b5