Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:51

General

  • Target

    file.exe

  • Size

    793KB

  • MD5

    e20a655b86160ccf447335a2c46f26b5

  • SHA1

    d4ab242cb31486f3157e671c66a6928877153e33

  • SHA256

    7ac4ba6a0c6fcc5e815308e7a27b0b2148f9e7642651092db997ca178a024c3d

  • SHA512

    96d5d459c5788dea9c497a1bb8152caeb43595b768e5d432896dff2dceafc0abd2eadff6f9b3356882ff9530a795101191b07f91932eb346c05a2d9183356a73

  • SSDEEP

    24576:hLAt3ieGOGoNOcfLtAz2QFPlePWBoytIj:te/VNLFIAPxGY

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 10 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\hioirkxfyzyjyjky.exe
      "hioirkxfyzyjyjky.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "wmic cpu get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic cpu get name
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "wmic path win32_VideoController get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:292
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic os get Caption
        3⤵
          PID:1252
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "Set-ItemProperty -Path C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe -Name CreationTime -Value \"06/13/2019 3:16 PM\""
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1580
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "Set-ItemProperty -Path C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe -Name LastWriteTime -Value \"06/13/2019 3:16 PM\""
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:768
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "Set-ItemProperty -Path C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe -Name LastAccessTime -Value \"06/13/2019 3:16 PM\""
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1972
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN Dameon /TR C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN Dameon /TR C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe
            4⤵
            • Creates scheduled task(s)
            PID:1368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 1408
        2⤵
        • Program crash
        PID:1588
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {BEAA956F-6D40-4731-9CEB-9418DB7300F3} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe
        C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe
        2⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "wmic cpu get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1308
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic cpu get name
            4⤵
              PID:1624
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic path win32_VideoController get name"
            3⤵
              PID:1376
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic path win32_VideoController get name
                4⤵
                  PID:1964
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic os get Caption
                3⤵
                  PID:1128

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              340B

              MD5

              febc13aae29a296f2799e0be8db15844

              SHA1

              56a4554fa8eceaf039ce0470ddfca84f0c016764

              SHA256

              52de39a069a01976db53163ba174672d654ada60dcb03013f46c10cce3e39b30

              SHA512

              ee5c0af1254db2ac37f392f5537060bf8cc9edf448f02217eb1f68c76b859e0a8a9328ee10e28e2a914dd2d4d5b6e540aad3ea0d7a33fdb4934e69868bf7b7ec

            • C:\Users\Admin\AppData\Local\Temp\hioirkxfyzyjyjky.exe

              Filesize

              4.4MB

              MD5

              5edbd58e96f8d635ad11061887f4e4d2

              SHA1

              762698ae098ea05df49ab32134895d58a71dfcae

              SHA256

              0892220029b9506b7089f1c8bd668a4286251a7bbd25998ccdf703e6e172646a

              SHA512

              8bf3acd9afaac5beaba42e348e9e6ec6815c6256780f2f6f8f61fbbb9cfcab01f085dfb63515f25284860f2693b065685e7d47ae7e8e07014d128169e47e6db0

            • C:\Users\Admin\AppData\Local\Temp\hioirkxfyzyjyjky.exe

              Filesize

              4.4MB

              MD5

              5edbd58e96f8d635ad11061887f4e4d2

              SHA1

              762698ae098ea05df49ab32134895d58a71dfcae

              SHA256

              0892220029b9506b7089f1c8bd668a4286251a7bbd25998ccdf703e6e172646a

              SHA512

              8bf3acd9afaac5beaba42e348e9e6ec6815c6256780f2f6f8f61fbbb9cfcab01f085dfb63515f25284860f2693b065685e7d47ae7e8e07014d128169e47e6db0

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              04da8ab6551f617531c4dac341f1b92b

              SHA1

              c118fdc23ecd7e1fe63b00e1317888f7fa28b10e

              SHA256

              b1ee2391df22d4cf228889ccbc42360fff4399fad43bd3c518307aa7c560ff5e

              SHA512

              8052f6b79347042d3cc6336dc66d1f9b34afdfb004875353c7acb34c380dc0555927388dfc66f9979550ec3d18e1d0114fd85e84834ca01082db156b50bbfb71

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              04da8ab6551f617531c4dac341f1b92b

              SHA1

              c118fdc23ecd7e1fe63b00e1317888f7fa28b10e

              SHA256

              b1ee2391df22d4cf228889ccbc42360fff4399fad43bd3c518307aa7c560ff5e

              SHA512

              8052f6b79347042d3cc6336dc66d1f9b34afdfb004875353c7acb34c380dc0555927388dfc66f9979550ec3d18e1d0114fd85e84834ca01082db156b50bbfb71

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              04da8ab6551f617531c4dac341f1b92b

              SHA1

              c118fdc23ecd7e1fe63b00e1317888f7fa28b10e

              SHA256

              b1ee2391df22d4cf228889ccbc42360fff4399fad43bd3c518307aa7c560ff5e

              SHA512

              8052f6b79347042d3cc6336dc66d1f9b34afdfb004875353c7acb34c380dc0555927388dfc66f9979550ec3d18e1d0114fd85e84834ca01082db156b50bbfb71

            • C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe

              Filesize

              530.4MB

              MD5

              4e61ce18b1bbe0dec82f85e225c5351f

              SHA1

              fc3e0a1514f29d604609137938a7e681e85c68ce

              SHA256

              4a6f8fc9c4d7b2704cfb172b9deab8ff82865b6bab26aa23f158d96fb851baea

              SHA512

              4138f60bcac785e13809d5f4fab2af46bed099b02b65889a40422fe239953c8139ab047717d6075d3f3a5d1fef1c2712ad8af00806d41436a63235715cbd6a54

            • C:\Users\Admin\AppData\Roaming\Mozilla\tools\Dameon.exe

              Filesize

              530.4MB

              MD5

              4e61ce18b1bbe0dec82f85e225c5351f

              SHA1

              fc3e0a1514f29d604609137938a7e681e85c68ce

              SHA256

              4a6f8fc9c4d7b2704cfb172b9deab8ff82865b6bab26aa23f158d96fb851baea

              SHA512

              4138f60bcac785e13809d5f4fab2af46bed099b02b65889a40422fe239953c8139ab047717d6075d3f3a5d1fef1c2712ad8af00806d41436a63235715cbd6a54

            • \Users\Admin\AppData\Local\Temp\freebl3.dll

              Filesize

              669KB

              MD5

              ed6249f72ba742802b2fa3ef20900d18

              SHA1

              6e50eec3f0b13ff71f86ffc46cf7a1d079381bf3

              SHA256

              a5396eba9d0564f4bcbafd5a8c4a4019b4b50a5c70a42aef5491a230d21f2922

              SHA512

              6da4cd5642becef120dbde2d070332d08bf5779bc0ffe66bf3cc51ca13db5619ee0b4f8fe3bc897c1876614a2512b2598f5d1c372764dd18b474081004d87c98

            • \Users\Admin\AppData\Local\Temp\hioirkxfyzyjyjky.exe

              Filesize

              4.4MB

              MD5

              5edbd58e96f8d635ad11061887f4e4d2

              SHA1

              762698ae098ea05df49ab32134895d58a71dfcae

              SHA256

              0892220029b9506b7089f1c8bd668a4286251a7bbd25998ccdf703e6e172646a

              SHA512

              8bf3acd9afaac5beaba42e348e9e6ec6815c6256780f2f6f8f61fbbb9cfcab01f085dfb63515f25284860f2693b065685e7d47ae7e8e07014d128169e47e6db0

            • \Users\Admin\AppData\Local\Temp\hioirkxfyzyjyjky.exe

              Filesize

              4.4MB

              MD5

              5edbd58e96f8d635ad11061887f4e4d2

              SHA1

              762698ae098ea05df49ab32134895d58a71dfcae

              SHA256

              0892220029b9506b7089f1c8bd668a4286251a7bbd25998ccdf703e6e172646a

              SHA512

              8bf3acd9afaac5beaba42e348e9e6ec6815c6256780f2f6f8f61fbbb9cfcab01f085dfb63515f25284860f2693b065685e7d47ae7e8e07014d128169e47e6db0

            • \Users\Admin\AppData\Local\Temp\mozglue.dll

              Filesize

              627KB

              MD5

              5d59e053d45049ffb8c6c08d8944e30c

              SHA1

              292f748d5e326143c3233e9d290087337700d606

              SHA256

              bcbf8c8ba4386b7716d5481ef9d089b9448990736d3eebdcfa611a09045c3ec3

              SHA512

              0f8b1c9c30d7b71fb7560377e5895c7bd15d71928c34465b1dde31ae770b6d38d5bac4d34ef4add9e08b72f2b9ea53958f167b0690fa0731af205528512a987b

            • \Users\Admin\AppData\Local\Temp\nss3.dll

              Filesize

              2.0MB

              MD5

              05ed4ffbf6b785750d2cdacca9287f10

              SHA1

              579c656536ce9cd076fc790cf443caf3a8db5b8f

              SHA256

              0bce97e8f6cc435250fb6aea0441e4146c7c8f8d90a9b1e76dfabd8701bfd882

              SHA512

              dddabf3ab629ec5b15e879f90d5f9bb69d6a8b47222989d3e683cbc8a6d4072740a5c5db05952d236529dfdde645990d21a4a9b32c4419ace9e2fe409fce4f01

            • \Users\Admin\AppData\Local\Temp\softokn3.dll

              Filesize

              251KB

              MD5

              3a59b504f6c41324b0d6cb6edbe3ad61

              SHA1

              2b3aff110badd913d221605d2f01638473dc5756

              SHA256

              c10801dba6c50237dba700fe2be920f091792e45c32e00db7c63c2c19a35f3a5

              SHA512

              56c9b7d4afcf8666aedaf55f819b799f2d84bc0736e0c431973114ae760da57209041785b7894f8b6d8d3e70bf040db68f7a95fcbb419fb6c44b70266eecc02d

            • memory/292-63-0x0000000000000000-mapping.dmp

            • memory/460-57-0x0000000000000000-mapping.dmp

            • memory/768-90-0x00000000731B0000-0x000000007375B000-memory.dmp

              Filesize

              5.7MB

            • memory/768-87-0x0000000000000000-mapping.dmp

            • memory/1044-61-0x0000000000000000-mapping.dmp

            • memory/1088-91-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/1088-64-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/1088-76-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/1088-54-0x0000000076681000-0x0000000076683000-memory.dmp

              Filesize

              8KB

            • memory/1128-108-0x0000000000000000-mapping.dmp

            • memory/1128-60-0x0000000000000000-mapping.dmp

            • memory/1252-75-0x0000000000000000-mapping.dmp

            • memory/1308-104-0x0000000000000000-mapping.dmp

            • memory/1368-62-0x0000000000000000-mapping.dmp

            • memory/1368-100-0x0000000000000000-mapping.dmp

            • memory/1376-106-0x0000000000000000-mapping.dmp

            • memory/1380-96-0x0000000000000000-mapping.dmp

            • memory/1380-99-0x00000000731B0000-0x000000007375B000-memory.dmp

              Filesize

              5.7MB

            • memory/1380-101-0x00000000731B0000-0x000000007375B000-memory.dmp

              Filesize

              5.7MB

            • memory/1580-86-0x00000000733E0000-0x000000007398B000-memory.dmp

              Filesize

              5.7MB

            • memory/1580-84-0x00000000733E0000-0x000000007398B000-memory.dmp

              Filesize

              5.7MB

            • memory/1580-82-0x0000000000000000-mapping.dmp

            • memory/1588-80-0x0000000000000000-mapping.dmp

            • memory/1600-102-0x0000000000000000-mapping.dmp

            • memory/1624-105-0x0000000000000000-mapping.dmp

            • memory/1964-107-0x0000000000000000-mapping.dmp

            • memory/1972-95-0x0000000073180000-0x000000007372B000-memory.dmp

              Filesize

              5.7MB

            • memory/1972-92-0x0000000000000000-mapping.dmp