Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe
Resource
win10v2004-20220901-en
General
-
Target
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe
-
Size
316KB
-
MD5
953aa86de9d62d974497010aabd665ed
-
SHA1
ab184b2ad827c980582bf2399fba39a53904bd8c
-
SHA256
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20
-
SHA512
541d26d65766a6e9ba4737d1d12efd83c37b9f53c32f4bcca8f7ddfacb7af6bd9863ce6de614c6f4f2efdf6efd374969ebee8cc86db88ef914c9b1d68bca04d4
-
SSDEEP
3072:jImWY8geeqNlkvqGejAOS6p6ZXTedakBgOl0QuXJTYHkjPf0vax8gI5:8mW/Fxl81np6pKDe6Ol0bXJCkDWKS5
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1324-58-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
WerFaultSecure.exepid process 1672 WerFaultSecure.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MrbBtW8LiihJkAFUZeJbQMO+ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\getmac.exe\"" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exeWerFaultSecure.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFaultSecure.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exeWerFaultSecure.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName WerFaultSecure.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
Processes:
WerFaultSecure.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" WerFaultSecure.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
WerFaultSecure.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" WerFaultSecure.exe -
Processes:
WerFaultSecure.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main WerFaultSecure.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exeWerFaultSecure.exeiexpress.exepid process 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1600 iexpress.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe 1672 WerFaultSecure.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WerFaultSecure.exeiexpress.exedescription pid process Token: SeDebugPrivilege 1672 WerFaultSecure.exe Token: SeDebugPrivilege 1600 iexpress.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.execmd.exeWerFaultSecure.exedescription pid process target process PID 1324 wrote to memory of 1608 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe cmd.exe PID 1324 wrote to memory of 1608 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe cmd.exe PID 1324 wrote to memory of 1608 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe cmd.exe PID 1324 wrote to memory of 1608 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe cmd.exe PID 1608 wrote to memory of 1092 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1092 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1092 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1092 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1324 wrote to memory of 1672 1324 d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe WerFaultSecure.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe PID 1672 wrote to memory of 1600 1672 WerFaultSecure.exe iexpress.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe"C:\Users\Admin\AppData\Local\Temp\d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4gq1sglk.default-release\storage\permanent\chrome\idb\3F33.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 33⤵
- Runs ping.exe
PID:1092 -
C:\Windows\SysWOW64\reg.exereg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MrbBtW8LiihJkAFUZeJbQMO+" /d "\"C:\Users\Admin\AppData\Roaming\Macromedia\getmac.exe"\"3⤵
- Adds Run key to start application
PID:1632 -
C:\Windows\SysWOW64\WerFaultSecure.exeC:\Windows\System32\WerFaultSecure.exe2⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\iexpress.exeC:\Windows\System32\iexpress.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD5953aa86de9d62d974497010aabd665ed
SHA1ab184b2ad827c980582bf2399fba39a53904bd8c
SHA256d1bbea57c5b0c7d1b08ff921a1524353c323a7692c6fdc5571979d5104255e20
SHA512541d26d65766a6e9ba4737d1d12efd83c37b9f53c32f4bcca8f7ddfacb7af6bd9863ce6de614c6f4f2efdf6efd374969ebee8cc86db88ef914c9b1d68bca04d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4gq1sglk.default-release\storage\permanent\chrome\idb\3F33.tmp.bat
Filesize300B
MD5592ed2add3179aada852cab72e5a07db
SHA16d78566c271ba6169ae262d62f2f0b5016a7a96e
SHA25655fb1eada858d4c8f9c69b28703918a6558b75ac4ff1b6899fcbdb28d777bd7a
SHA5128d2675752dab39305ff291af03e7fd5333138a8acdf9be250c0e6d24b3f9b43bc1ded9081f77a8012513e3cea069ecafd965a3f25b84b5ce364031a63c0574ef