Analysis

  • max time kernel
    222s
  • max time network
    273s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:31

General

  • Target

    901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583.exe

  • Size

    1.5MB

  • MD5

    d7a957263383d19d61ebeb2b62d951c6

  • SHA1

    365efefe7f03365350fee1cd53390503ba59c432

  • SHA256

    901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583

  • SHA512

    4473b041544a7269218d22310414009b573b0675f1a9ce259dbd2c978326f5edede61ae2485db79cfbafcfe91c409433f6e2218fbda0ff48b347f1bf878735cd

  • SSDEEP

    24576:YUaFzB/16ufrxciyzupTKMTu2sAQhyn3WUQx0ijGNPP9yqKywEQQSgwgtxU2dQi3:Ql/MufrSi9OCyyn/ZVVyq6Q6gRQbgYd6

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 11 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 11 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583.exe
    "C:\Users\Admin\AppData\Local\Temp\901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Users\Admin\AppData\Local\Temp\901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583.exe
      "C:\Users\Admin\AppData\Local\Temp\901889e2fc6513718c175075c98cab4b01026f025d8cd2e38a3008cb8e17e583.exe"
      2⤵
      • Drops file in Drivers directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
          PID:2012
      • C:\Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\fc3764e04bfdba088ff8ef25fa\Setup.exe
          C:\fc3764e04bfdba088ff8ef25fa\\Setup.exe /x86 /x64 /web
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe

      Filesize

      982KB

      MD5

      9e8253f0a993e53b4809dbd74b335227

      SHA1

      f6ba6f03c65c3996a258f58324a917463b2d6ff4

      SHA256

      e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

      SHA512

      404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

    • C:\Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe

      Filesize

      982KB

      MD5

      9e8253f0a993e53b4809dbd74b335227

      SHA1

      f6ba6f03c65c3996a258f58324a917463b2d6ff4

      SHA256

      e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

      SHA512

      404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

    • C:\fc3764e04bfdba088ff8ef25fa\DHTMLHeader.html

      Filesize

      15KB

      MD5

      cd131d41791a543cc6f6ed1ea5bd257c

      SHA1

      f42a2708a0b42a13530d26515274d1fcdbfe8490

      SHA256

      e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb

      SHA512

      a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a

    • C:\fc3764e04bfdba088ff8ef25fa\Setup.exe

      Filesize

      85KB

      MD5

      8b3ecf4d59a85dae0960d3175865a06d

      SHA1

      fc81227ec438adc3f23e03a229a263d26bcf9092

      SHA256

      2b088aefcc76d0baa0bff0843bf458db27bacc47a8e698c9948e53ffc471828b

      SHA512

      a58a056a3a5814a13153b4c594ed72796b4598f8e715771fc31e60c60a2e26250768b8f36b18675b91e7ecc777ef27c7554f7a0e92c2dfaba74531e669c38263

    • C:\fc3764e04bfdba088ff8ef25fa\SetupEngine.dll

      Filesize

      868KB

      MD5

      43bc7b5dfd2e45751d6d2ca7274063e4

      SHA1

      a8955033d0e94d33114a1205fe7038c6ae2f54f1

      SHA256

      a11af883273ddbd24bfed4a240c43f41ce3d8c7962ec970da2d4c7e13b563d04

      SHA512

      3f3068e660fea932e91e4d141d8202466b72447107ff43f90dea9557fc188696617025531220bc113dc19fdd7adf313a47ac5f2a4ce94c65f9aeb2d7deda7f36

    • C:\fc3764e04bfdba088ff8ef25fa\sqmapi.dll

      Filesize

      191KB

      MD5

      d475bbd6fef8db2dde0da7ccfd2c9042

      SHA1

      80887bdb64335762a3b1d78f7365c4ee9cfaeab5

      SHA256

      8e9d77a216d8dd2be2b304e60edf85ce825309e67262fcff1891aede63909599

      SHA512

      f760e02d4d336ac384a0125291b9deac88c24f457271be686b6d817f01ea046d286c73deddbf0476dcc2ade3b3f5329563abd8f2f1e40aee817fee1e3766d008

    • \Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe

      Filesize

      982KB

      MD5

      9e8253f0a993e53b4809dbd74b335227

      SHA1

      f6ba6f03c65c3996a258f58324a917463b2d6ff4

      SHA256

      e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

      SHA512

      404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

    • \Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe

      Filesize

      982KB

      MD5

      9e8253f0a993e53b4809dbd74b335227

      SHA1

      f6ba6f03c65c3996a258f58324a917463b2d6ff4

      SHA256

      e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

      SHA512

      404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

    • \Users\Admin\AppData\Local\Temp\Windows-KB26184457-DEU.exe.exe

      Filesize

      982KB

      MD5

      9e8253f0a993e53b4809dbd74b335227

      SHA1

      f6ba6f03c65c3996a258f58324a917463b2d6ff4

      SHA256

      e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

      SHA512

      404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

    • \fc3764e04bfdba088ff8ef25fa\Setup.exe

      Filesize

      85KB

      MD5

      8b3ecf4d59a85dae0960d3175865a06d

      SHA1

      fc81227ec438adc3f23e03a229a263d26bcf9092

      SHA256

      2b088aefcc76d0baa0bff0843bf458db27bacc47a8e698c9948e53ffc471828b

      SHA512

      a58a056a3a5814a13153b4c594ed72796b4598f8e715771fc31e60c60a2e26250768b8f36b18675b91e7ecc777ef27c7554f7a0e92c2dfaba74531e669c38263

    • \fc3764e04bfdba088ff8ef25fa\SetupEngine.dll

      Filesize

      868KB

      MD5

      43bc7b5dfd2e45751d6d2ca7274063e4

      SHA1

      a8955033d0e94d33114a1205fe7038c6ae2f54f1

      SHA256

      a11af883273ddbd24bfed4a240c43f41ce3d8c7962ec970da2d4c7e13b563d04

      SHA512

      3f3068e660fea932e91e4d141d8202466b72447107ff43f90dea9557fc188696617025531220bc113dc19fdd7adf313a47ac5f2a4ce94c65f9aeb2d7deda7f36

    • \fc3764e04bfdba088ff8ef25fa\sqmapi.dll

      Filesize

      191KB

      MD5

      d475bbd6fef8db2dde0da7ccfd2c9042

      SHA1

      80887bdb64335762a3b1d78f7365c4ee9cfaeab5

      SHA256

      8e9d77a216d8dd2be2b304e60edf85ce825309e67262fcff1891aede63909599

      SHA512

      f760e02d4d336ac384a0125291b9deac88c24f457271be686b6d817f01ea046d286c73deddbf0476dcc2ade3b3f5329563abd8f2f1e40aee817fee1e3766d008

    • memory/520-65-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-66-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-57-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-58-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-73-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-83-0x0000000074510000-0x0000000074ABB000-memory.dmp

      Filesize

      5.7MB

    • memory/520-64-0x000000000047F02E-mapping.dmp

    • memory/520-62-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-94-0x0000000000825000-0x0000000000836000-memory.dmp

      Filesize

      68KB

    • memory/520-92-0x0000000074510000-0x0000000074ABB000-memory.dmp

      Filesize

      5.7MB

    • memory/520-70-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/520-60-0x0000000000080000-0x0000000000104000-memory.dmp

      Filesize

      528KB

    • memory/580-56-0x0000000074510000-0x0000000074ABB000-memory.dmp

      Filesize

      5.7MB

    • memory/580-55-0x0000000074510000-0x0000000074ABB000-memory.dmp

      Filesize

      5.7MB

    • memory/580-54-0x0000000075491000-0x0000000075493000-memory.dmp

      Filesize

      8KB

    • memory/580-79-0x0000000074510000-0x0000000074ABB000-memory.dmp

      Filesize

      5.7MB

    • memory/924-76-0x0000000000000000-mapping.dmp

    • memory/1668-85-0x0000000000000000-mapping.dmp

    • memory/2012-101-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2012-96-0x0000000000411654-mapping.dmp

    • memory/2012-95-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2012-99-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB