Analysis
-
max time kernel
118s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:45
Static task
static1
Behavioral task
behavioral1
Sample
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe
Resource
win7-20221111-en
General
-
Target
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe
-
Size
284KB
-
MD5
4464f9bc5babc1e96c985ac1f8c9afa0
-
SHA1
2df8c41aedbef55365678f2e33f5caec401e20f9
-
SHA256
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281
-
SHA512
858fb81b70018255a7436c5473242ea4e429754182c6fa548895cda8959379088c74a944c6872ed4c18fd52237da7ed86a4450de38602a8116c1d93c1da79749
-
SSDEEP
6144:clDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:clDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sethome625.exepid process 3116 sethome625.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
Processes:
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exedescription ioc process File created \??\c:\windows\system\sethome625.exe 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe File opened for modification \??\c:\windows\system\sethome625.exe 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exepid process 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exesethome625.exepid process 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe 3116 sethome625.exe 3116 sethome625.exe 3116 sethome625.exe 3116 sethome625.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exedescription pid process target process PID 5068 wrote to memory of 3116 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe sethome625.exe PID 5068 wrote to memory of 3116 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe sethome625.exe PID 5068 wrote to memory of 3116 5068 38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe sethome625.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe"C:\Users\Admin\AppData\Local\Temp\38039ca0791871161f913df75ca0c0c84a5d997d47e354da376134e455041281.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\windows\system\sethome625.exec:\windows\system\sethome625.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD541808c53bb0e8e2e15e1eb73f23656e0
SHA12d32726f8824275366fe816737c99f81e94d6f6b
SHA256bb5b601d7314f8aaff6d605cf77a08cf4073cd68d2e95833ca31130edc980392
SHA51203aab66ff8b48b207181fcad68d81cbe9ebf18a28440e251bdf560daad78e595419fcadc7cb50568bac42aed9607ef944251d43866014b28ba57d3e31ade58ca
-
Filesize
284KB
MD541808c53bb0e8e2e15e1eb73f23656e0
SHA12d32726f8824275366fe816737c99f81e94d6f6b
SHA256bb5b601d7314f8aaff6d605cf77a08cf4073cd68d2e95833ca31130edc980392
SHA51203aab66ff8b48b207181fcad68d81cbe9ebf18a28440e251bdf560daad78e595419fcadc7cb50568bac42aed9607ef944251d43866014b28ba57d3e31ade58ca