Analysis

  • max time kernel
    96s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:58

General

  • Target

    182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe

  • Size

    722KB

  • MD5

    8e910184cbe93a98e107ef6eb7809004

  • SHA1

    ce5525f237cf0d9a01ced51874ccbf83ca9321bf

  • SHA256

    182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb

  • SHA512

    08abac662dbafcf129f19723fd557ba0fd2d02753726c65e350e7080c2ae84be9fe8f7e42e22b8866021ac651c127070086c148dc69037da003b7cdbc4c7d040

  • SSDEEP

    12288:t81Ed0hYcVhenSZ/8H45yo96jxrE05xdm/KFtUmuX/BoAUEaZuT5On:t81EdVcVYSZncJZEqqEUZPBoAUEKuT52

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe
    "C:\Users\Admin\AppData\Local\Temp\182d01af549f30b21c9987c2c85eef620eebe6c9202e689f92e8cd4dbf9284eb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe

    Filesize

    327KB

    MD5

    35f1cf871c50e1a13c5430c926b94148

    SHA1

    90df8df3dcfc20d1e549bbe50f9627e51c801070

    SHA256

    a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171

    SHA512

    e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe

    Filesize

    327KB

    MD5

    35f1cf871c50e1a13c5430c926b94148

    SHA1

    90df8df3dcfc20d1e549bbe50f9627e51c801070

    SHA256

    a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171

    SHA512

    e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sqlite3.dll

    Filesize

    586KB

    MD5

    2c7b219cd45e962c49b1834083c75183

    SHA1

    053bbbfa1250baadd702ca3a9823552e1ed13d4d

    SHA256

    d1cbb5835a4b94417501f59f179a235a02f1d64ed780fa51b5d6a39a5f565c59

    SHA512

    132b518289358124329b3523ce561dfc23a2445d8360835f65303e11d774341b6996a29bff8d649806a1ae579c071761bc6fb19a70c677ff68085bd6be81dcf1

  • \Users\Admin\AppData\Local\Temp\RarSFX0\fbupdate.exe

    Filesize

    327KB

    MD5

    35f1cf871c50e1a13c5430c926b94148

    SHA1

    90df8df3dcfc20d1e549bbe50f9627e51c801070

    SHA256

    a0776e68d42e920a1ce36716d9d7ecd251e32ec2ef0d9f74340dc3f3e2b50171

    SHA512

    e576d00ef6514cd11434a2ad015eaa80e3d2533ab1e3b39d00c0a3c653f3374eb5c94db708109118e017a030d87fa70601fb1b839e51d4098c26eecd98f1bd19

  • \Users\Admin\AppData\Local\Temp\RarSFX0\sqlite3.dll

    Filesize

    586KB

    MD5

    2c7b219cd45e962c49b1834083c75183

    SHA1

    053bbbfa1250baadd702ca3a9823552e1ed13d4d

    SHA256

    d1cbb5835a4b94417501f59f179a235a02f1d64ed780fa51b5d6a39a5f565c59

    SHA512

    132b518289358124329b3523ce561dfc23a2445d8360835f65303e11d774341b6996a29bff8d649806a1ae579c071761bc6fb19a70c677ff68085bd6be81dcf1

  • memory/956-69-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/956-74-0x00000000744C0000-0x000000007450F000-memory.dmp

    Filesize

    316KB

  • memory/956-62-0x0000000077000000-0x0000000077047000-memory.dmp

    Filesize

    284KB

  • memory/956-63-0x0000000076A30000-0x0000000076ADC000-memory.dmp

    Filesize

    688KB

  • memory/956-64-0x0000000076C00000-0x0000000076D5C000-memory.dmp

    Filesize

    1.4MB

  • memory/956-65-0x0000000076FA0000-0x0000000076FF7000-memory.dmp

    Filesize

    348KB

  • memory/956-85-0x0000000077000000-0x0000000077047000-memory.dmp

    Filesize

    284KB

  • memory/956-67-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/956-68-0x00000000003A0000-0x00000000003DD000-memory.dmp

    Filesize

    244KB

  • memory/956-84-0x00000000003A0000-0x00000000003DD000-memory.dmp

    Filesize

    244KB

  • memory/956-71-0x0000000077000000-0x0000000077047000-memory.dmp

    Filesize

    284KB

  • memory/956-73-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/956-72-0x0000000075220000-0x0000000075255000-memory.dmp

    Filesize

    212KB

  • memory/956-56-0x0000000000000000-mapping.dmp

  • memory/956-75-0x0000000074510000-0x0000000074568000-memory.dmp

    Filesize

    352KB

  • memory/956-76-0x0000000074501000-0x0000000074519000-memory.dmp

    Filesize

    96KB

  • memory/956-78-0x00000000766D0000-0x000000007675F000-memory.dmp

    Filesize

    572KB

  • memory/956-79-0x00000000744A0000-0x00000000744E4000-memory.dmp

    Filesize

    272KB

  • memory/956-83-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/956-81-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/956-82-0x0000000077000000-0x0000000077047000-memory.dmp

    Filesize

    284KB

  • memory/2036-80-0x0000000003220000-0x0000000003283000-memory.dmp

    Filesize

    396KB

  • memory/2036-54-0x0000000075591000-0x0000000075593000-memory.dmp

    Filesize

    8KB

  • memory/2036-66-0x0000000003220000-0x0000000003283000-memory.dmp

    Filesize

    396KB

  • memory/2036-86-0x0000000003220000-0x000000000327D000-memory.dmp

    Filesize

    372KB