Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:25

General

  • Target

    3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe

  • Size

    1.4MB

  • MD5

    e30c81f42a72512d32754e595e80e942

  • SHA1

    fe665ba908128e59957ff756a6a7984a0f71b2c6

  • SHA256

    3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

  • SHA512

    d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

  • SSDEEP

    24576:j0AZbveE+KiB7+AwKeAm8J7X32A66MisH+98OqoYaejLs13doYg7:vbveE+tyAwBAm8RXale980sjLMA7

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    general123

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NirSoft WebBrowserPassView 9 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe
    "C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\dwm\mata.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe "C:\Users\Admin\AppData\Local\Temp\dwm\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat" "
          4⤵
            PID:1100
      • C:\Users\Admin\AppData\Local\Temp\notepad .exe
        "C:\Users\Admin\AppData\Local\Temp\notepad .exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          3⤵
            PID:992
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\dwm\stres.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 300
            3⤵
            • Delays execution with timeout.exe
            PID:456
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\dwm\melt.bat
          2⤵
            PID:1916

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dwm\dwm.exe

          Filesize

          1.4MB

          MD5

          e30c81f42a72512d32754e595e80e942

          SHA1

          fe665ba908128e59957ff756a6a7984a0f71b2c6

          SHA256

          3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

          SHA512

          d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

        • C:\Users\Admin\AppData\Local\Temp\dwm\invs.vbs

          Filesize

          78B

          MD5

          c578d9653b22800c3eb6b6a51219bbb8

          SHA1

          a97aa251901bbe179a48dbc7a0c1872e163b1f2d

          SHA256

          20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

          SHA512

          3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

        • C:\Users\Admin\AppData\Local\Temp\dwm\mata.bat

          Filesize

          55B

          MD5

          3869b1297bc06c40dc6f5ea31718bff0

          SHA1

          e5653782e1b9744e96986f39193efcc6387738db

          SHA256

          f93541eaa86aee5f93d653aba074dc54036930dce6bc451aa34a8e70040c9b12

          SHA512

          3ba9e57331a04511edc2539827e056f4ad9dde0290638d5e628d1b29e2d367bfc17b1143b1f2cb5f07ebafac68464efdf562d98e29bf2f5622f3773fc0ec5b45

        • C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat

          Filesize

          56B

          MD5

          be1178e094e74d093f967770b1a7964c

          SHA1

          72be3cc73763b4cf3363aad44893a87090601c1f

          SHA256

          c54a8f69995f08d626a728a4df16011e509f314f6ab9ffaa951def8493198d46

          SHA512

          02af9f756ed552f6f0b14b4ea1482ef4b8479d53c42e35e905b1c67bd0362766d6484613880dbca45c20cb5730f5bdf6ba5d2141e830d1cf971388860492a9e2

        • C:\Users\Admin\AppData\Local\Temp\dwm\rundll11-.txt

          Filesize

          1.4MB

          MD5

          e30c81f42a72512d32754e595e80e942

          SHA1

          fe665ba908128e59957ff756a6a7984a0f71b2c6

          SHA256

          3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

          SHA512

          d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

        • C:\Users\Admin\AppData\Local\Temp\dwm\stres.bat

          Filesize

          203B

          MD5

          b925c3b33f6d0202920661322f1ec35f

          SHA1

          1ead16fd004506d5ca48d9fcf39153b59baa50ec

          SHA256

          e5b85a2f172ba9f4f91eb938abb8d53bbf3a354cc84cee404717788d95542f91

          SHA512

          152c5f2a8753d0f369bd268d4c2244abde92bcc7fad0607a0c99aaeacfa91e13e6a6c7aec2ab9a5a34864517df2bbcb2a0d59a6949cd35f1441d3701df9e283b

        • C:\Users\Admin\AppData\Local\Temp\notepad .exe

          Filesize

          52KB

          MD5

          278edbd499374bf73621f8c1f969d894

          SHA1

          a81170af14747781c5f5f51bb1215893136f0bc0

          SHA256

          c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391

          SHA512

          93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

        • C:\Users\Admin\AppData\Local\Temp\notepad .exe

          Filesize

          52KB

          MD5

          278edbd499374bf73621f8c1f969d894

          SHA1

          a81170af14747781c5f5f51bb1215893136f0bc0

          SHA256

          c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391

          SHA512

          93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

        • \Users\Admin\AppData\Local\Temp\notepad .exe

          Filesize

          52KB

          MD5

          278edbd499374bf73621f8c1f969d894

          SHA1

          a81170af14747781c5f5f51bb1215893136f0bc0

          SHA256

          c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391

          SHA512

          93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

        • memory/456-84-0x0000000000000000-mapping.dmp

        • memory/660-63-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/660-80-0x0000000074100000-0x00000000746AB000-memory.dmp

          Filesize

          5.7MB

        • memory/660-64-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/660-79-0x0000000074100000-0x00000000746AB000-memory.dmp

          Filesize

          5.7MB

        • memory/660-60-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/660-71-0x0000000000000000-mapping.dmp

        • memory/660-73-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/660-61-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/660-76-0x0000000000400000-0x000000000046C000-memory.dmp

          Filesize

          432KB

        • memory/884-65-0x0000000000000000-mapping.dmp

        • memory/992-87-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/992-90-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/992-89-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/992-88-0x0000000000442628-mapping.dmp

        • memory/1100-69-0x0000000000000000-mapping.dmp

        • memory/1712-57-0x0000000000000000-mapping.dmp

        • memory/1748-81-0x0000000000000000-mapping.dmp

        • memory/1772-86-0x0000000074100000-0x00000000746AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1772-55-0x0000000074100000-0x00000000746AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1772-56-0x0000000074100000-0x00000000746AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1772-54-0x0000000075291000-0x0000000075293000-memory.dmp

          Filesize

          8KB

        • memory/1916-85-0x0000000000000000-mapping.dmp