Analysis

  • max time kernel
    192s
  • max time network
    226s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:00

General

  • Target

    d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe

  • Size

    630KB

  • MD5

    fd3d9cb2162ced9d29e7e4de9e16007c

  • SHA1

    88ec4fea49fcf905a24aabf3150c03e7f0643994

  • SHA256

    d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9

  • SHA512

    a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8

  • SSDEEP

    12288:Kkw7gYZ4+Rutkdy2oqvdT406LGrkGE4Qiujc+0BjgiD:pw7pXktkHT40BFE77FGjg

Malware Config

Signatures

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • Nirsoft 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe
      "C:\Users\Admin\AppData\Local\Temp\d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 2148
        3⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logff.txt
        3⤵
          PID:2152
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\logmail.txt
          3⤵
            PID:1988
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5080
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3392
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4172
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                dw20.exe -x -s 1824
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4116
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"
              4⤵
              • Executes dropped EXE
              PID:1184

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WUDHost.exe.log

        Filesize

        224B

        MD5

        c19eb8c8e7a40e6b987f9d2ee952996e

        SHA1

        6fc3049855bc9100643e162511673c6df0f28bfb

        SHA256

        677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a

        SHA512

        860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

        Filesize

        630KB

        MD5

        fd3d9cb2162ced9d29e7e4de9e16007c

        SHA1

        88ec4fea49fcf905a24aabf3150c03e7f0643994

        SHA256

        d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9

        SHA512

        a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

        Filesize

        630KB

        MD5

        fd3d9cb2162ced9d29e7e4de9e16007c

        SHA1

        88ec4fea49fcf905a24aabf3150c03e7f0643994

        SHA256

        d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9

        SHA512

        a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe

        Filesize

        630KB

        MD5

        fd3d9cb2162ced9d29e7e4de9e16007c

        SHA1

        88ec4fea49fcf905a24aabf3150c03e7f0643994

        SHA256

        d565fbd8a9d7e7f11b986f23f7fa142510c538cdd22c7f039fc4da992b173bd9

        SHA512

        a17919a9ef55881dc088764fda7505e0f7faa824797f6556fba21407b15fdf99b57379b9ed1337bb797fdcf756bb3c3fe21b5b981d3dcb3ed9ffd53da3fdc0f8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

        Filesize

        8KB

        MD5

        203abaf3a0b4387f8c83b8df44b52be4

        SHA1

        f298f77bf98b2941d4c7473c8fe0e8feedaaca6f

        SHA256

        4b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38

        SHA512

        475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

        Filesize

        8KB

        MD5

        203abaf3a0b4387f8c83b8df44b52be4

        SHA1

        f298f77bf98b2941d4c7473c8fe0e8feedaaca6f

        SHA256

        4b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38

        SHA512

        475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe

        Filesize

        8KB

        MD5

        203abaf3a0b4387f8c83b8df44b52be4

        SHA1

        f298f77bf98b2941d4c7473c8fe0e8feedaaca6f

        SHA256

        4b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38

        SHA512

        475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50

      • memory/1184-160-0x0000000000000000-mapping.dmp

      • memory/1184-163-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/1972-133-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/1972-157-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/1972-132-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/1988-167-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1988-166-0x0000000000000000-mapping.dmp

      • memory/1988-172-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1988-169-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1988-171-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2152-150-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2152-170-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2152-164-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/2152-149-0x0000000000000000-mapping.dmp

      • memory/2152-156-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3392-143-0x0000000000000000-mapping.dmp

      • memory/3392-146-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/3392-147-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/3596-141-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/3596-136-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/3596-134-0x0000000000000000-mapping.dmp

      • memory/4116-159-0x0000000000000000-mapping.dmp

      • memory/4172-152-0x0000000000000000-mapping.dmp

      • memory/4172-165-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/4172-155-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/4172-153-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/4740-148-0x0000000000000000-mapping.dmp

      • memory/5080-158-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/5080-142-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/5080-140-0x0000000074A00000-0x0000000074FB1000-memory.dmp

        Filesize

        5.7MB

      • memory/5080-137-0x0000000000000000-mapping.dmp