Analysis

  • max time kernel
    174s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 06:47

General

  • Target

    f2bd8dad0865697b7422f3ef00bd860c3616e8080dbf12c7e6b0e5828cebf0d8.exe

  • Size

    1.2MB

  • MD5

    a2aad753587a08feeb95e997e0b50b06

  • SHA1

    44e7398af49003fa3d8632519af7910360f9bb93

  • SHA256

    f2bd8dad0865697b7422f3ef00bd860c3616e8080dbf12c7e6b0e5828cebf0d8

  • SHA512

    4283eb55e555019e0b6bc8bb6399080a780c648fb02a9778435d2b4fc8eb8369aea291cc36940aad4a3e322af9b87152adc0c297d98e011dc85077709419b96d

  • SSDEEP

    24576:w32K9nTaIi6fKcs2RDCZ3uBs0Sb9m3n7IWOZp46aE9RAW:w3MIimKZ8mBuBs0S58nbOZ1aE9O

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2bd8dad0865697b7422f3ef00bd860c3616e8080dbf12c7e6b0e5828cebf0d8.exe
    "C:\Users\Admin\AppData\Local\Temp\f2bd8dad0865697b7422f3ef00bd860c3616e8080dbf12c7e6b0e5828cebf0d8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Roaming\cpuid.exe
        "C:\Users\Admin\AppData\Roaming\cpuid.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c dir /b /s /a "C:\Users\Admin\AppData\Roaming\*.dat"
          4⤵
            PID:1964

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\cpuid.exe
      Filesize

      376KB

      MD5

      3f941c126d0b8babc471e0e91c49a5bf

      SHA1

      6f7b63fbdf1bd596a4c87c04a023b6ab75c8b1d7

      SHA256

      357aeae30cfdc314f327d40f9be6e95a7b6bdb2688fe8fc0102a8a19c88c5af8

      SHA512

      ee09f0b1d43055714cd209141454114e190b0e36f16aeeb0b2368f7ff7bb9f6cdaf7b963e57059182121b530dd9f56bfd9077b83cddb522f04e5802ea6045a72

    • C:\Users\Admin\AppData\Roaming\cpuid.exe
      Filesize

      376KB

      MD5

      3f941c126d0b8babc471e0e91c49a5bf

      SHA1

      6f7b63fbdf1bd596a4c87c04a023b6ab75c8b1d7

      SHA256

      357aeae30cfdc314f327d40f9be6e95a7b6bdb2688fe8fc0102a8a19c88c5af8

      SHA512

      ee09f0b1d43055714cd209141454114e190b0e36f16aeeb0b2368f7ff7bb9f6cdaf7b963e57059182121b530dd9f56bfd9077b83cddb522f04e5802ea6045a72

    • \Users\Admin\AppData\Roaming\cpuid.exe
      Filesize

      376KB

      MD5

      3f941c126d0b8babc471e0e91c49a5bf

      SHA1

      6f7b63fbdf1bd596a4c87c04a023b6ab75c8b1d7

      SHA256

      357aeae30cfdc314f327d40f9be6e95a7b6bdb2688fe8fc0102a8a19c88c5af8

      SHA512

      ee09f0b1d43055714cd209141454114e190b0e36f16aeeb0b2368f7ff7bb9f6cdaf7b963e57059182121b530dd9f56bfd9077b83cddb522f04e5802ea6045a72

    • memory/268-75-0x0000000002800000-0x00000000028C1000-memory.dmp
      Filesize

      772KB

    • memory/268-57-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-61-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-63-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-65-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-66-0x0000000000441175-mapping.dmp
    • memory/268-69-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-79-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-71-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-59-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/268-56-0x0000000000400000-0x00000000004BB000-memory.dmp
      Filesize

      748KB

    • memory/944-55-0x0000000074420000-0x00000000749CB000-memory.dmp
      Filesize

      5.7MB

    • memory/944-54-0x0000000075551000-0x0000000075553000-memory.dmp
      Filesize

      8KB

    • memory/944-70-0x0000000074420000-0x00000000749CB000-memory.dmp
      Filesize

      5.7MB

    • memory/1604-73-0x0000000000000000-mapping.dmp
    • memory/1604-76-0x0000000000400000-0x00000000004C1000-memory.dmp
      Filesize

      772KB

    • memory/1604-81-0x0000000000400000-0x00000000004C1000-memory.dmp
      Filesize

      772KB

    • memory/1604-82-0x0000000000400000-0x00000000004C1000-memory.dmp
      Filesize

      772KB

    • memory/1964-80-0x0000000000000000-mapping.dmp