Analysis

  • max time kernel
    150s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 14:16

General

  • Target

    f70d87a9d7ed40437815b3dcfa23f4b92c24751904dc765c7e0ab90efa353eb3.exe

  • Size

    647KB

  • MD5

    1180e3622577ef5698bda1e8d5ac8ac0

  • SHA1

    644d4ea0f44fa157793ce6729b9052253f677723

  • SHA256

    f70d87a9d7ed40437815b3dcfa23f4b92c24751904dc765c7e0ab90efa353eb3

  • SHA512

    b51b572af3a4faee031900957b449ad448d7bd8b4f0226393787d71d7732ce87b986033bfd26428ef1ec01476c5ecd1780270453398c7fc3e4f09f5a84962ffc

  • SSDEEP

    12288:npSrU96Qtnb3e6w6UKegFEWkXR2HtBwBDoIfeNRkyNGeEIABFjI1vp:nmU9htb3E67egFbkXR2NBw3feNRfUeEA

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1384
      • C:\Users\Admin\AppData\Local\Temp\f70d87a9d7ed40437815b3dcfa23f4b92c24751904dc765c7e0ab90efa353eb3.exe
        "C:\Users\Admin\AppData\Local\Temp\f70d87a9d7ed40437815b3dcfa23f4b92c24751904dc765c7e0ab90efa353eb3.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\151657.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
            4⤵
              PID:564
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
              4⤵
                PID:1948
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:856

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\151657.bat

                Filesize

                5KB

                MD5

                ad0d80bf6b4292dbada25f7f8fd6556c

                SHA1

                40133d1dea9905bf406fb88efcb57cd693e6cf43

                SHA256

                081f45a04b555b2406e5b63afbcdba4e564c3157e7d3720d21e8f53d2127bae1

                SHA512

                76eaacabecaaed7b4eb53fbc5db4d53b15ccdbe6526119346dc444e932cc1ebfffb74b0df3f54c85168d72082f9017802e9775bc178a58fcac0ab3c1ddb519cb

              • \Users\Admin\AppData\Local\Temp\DC87E2\mtuyolw.dll

                Filesize

                532KB

                MD5

                fa780de5b7b511628e30f836f8aca93f

                SHA1

                49e7669dbda1f899e7c818b03950cdda1254f97e

                SHA256

                924774da419210b689e7a5afa1862b2802ecd450e0630c6471a5f277a6a40d27

                SHA512

                28947b76c3d5f56a8ac88585165ebebd50503c9e796b0c5318e2101f018993c28bd5c5bdb39dad35bcefebd7b84e126c40c224bd3636813a350d0c8894fa5d2d

              • \Users\Admin\AppData\Local\Temp\DC87E2\tJFEylA.dll

                Filesize

                481KB

                MD5

                acc460e14e76cd7df7c3aea7fcf25e7d

                SHA1

                689664b83e468468d5179b6428c571686328394b

                SHA256

                898e410ea79efda9e6b5c89340ffa7eb337047d46ab12cf281d7e11de09c0ff4

                SHA512

                43511a969ab5ce2679a5161aa576f1c9e80e22cddc8ac2993f00a02bdfa290436f005301a44be136051740629f0d5a0ef389747f4baee1eb343c532327ff9c54

              • memory/1372-56-0x0000000075921000-0x0000000075923000-memory.dmp

                Filesize

                8KB