Analysis

  • max time kernel
    125s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 07:27

General

  • Target

    917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe

  • Size

    3.0MB

  • MD5

    65f49288a70b3d7b69d82e1feeafb2f4

  • SHA1

    0ffef7e980331930c45d341a87c20705ea8a3360

  • SHA256

    917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3

  • SHA512

    981707c177f294b9270f42d72151940708381087b6b0d2fbacc8bb4955e1e2996f9463c9b8378f2c83af4c83f324ed3e0de64434dd971125e07af323c715dd27

  • SSDEEP

    49152:mjlv2h3YZUZeHDgzlcBwb9gs8cjdk2+AAi/TcWsNkLLfy/AHi6y:iv2FI+ecJcBwJgs8ca2aWZHy/A

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe
    "C:\Users\Admin\AppData\Local\Temp\917778ad39300fd25dc2901f36396c1e299827e66b1bb8cac2e9e23b20cde3a3.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:848
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\cosstminn\04I.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\cosstminn\04I.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:376
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:3424
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:3584

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\cosstminn\04I.dat
        Filesize

        4KB

        MD5

        de368bd34dc36ce41711a49001481fa7

        SHA1

        b91011d79f7ab077941ea70374f725389c981a7e

        SHA256

        48c1e087fb793d93a79d7e516aa9cdc6ff58d2fa393895a5c5f67820771c0d7f

        SHA512

        528d7235f80b2f52d476fca1db30933b098f416080511e4c436b58fca2f112c5216d237ca9c605c5be53d258c5bcb75a888dfb0698519669e5c4e3d52cf920a6

      • C:\Program Files (x86)\cosstminn\04I.dll
        Filesize

        606KB

        MD5

        d0a9fd704266fb372807507df74c4101

        SHA1

        ec68536756c4af9d1f272077641be746bcb45394

        SHA256

        c4488056716132ddbc950f968acc358dc0b0973e6b5d3afd4fe5f7dc037dde2d

        SHA512

        d78e6600a9711dc21a6e086b8db713eb12d671052e543c16a74f12daeb97e12ec7c5ed9d39813882bcba5c6131af943115bcc35e68b891d5f59349e085ef24f7

      • C:\Program Files (x86)\cosstminn\04I.tlb
        Filesize

        3KB

        MD5

        596b14afa3a4cf4a24f570f58c5bf9dc

        SHA1

        5283fef61f1129881eb5f49c8058381ef2205054

        SHA256

        f91335a2720866f56454e5121b50ec26c88fb2b7545c07a1090119cdf79d2e17

        SHA512

        81303f8baed9043e7a2cbeb891b9742e8db284e10a229fc6e46a99f4e239da616c5223f2d400b74c4bfd9b937a8c882b5cf98aa8b46943d8deb2a3e06b4c1c2d

      • C:\Program Files (x86)\cosstminn\04I.x64.dll
        Filesize

        684KB

        MD5

        5b557ca9bc92357eb76a8c576df86e6d

        SHA1

        a66eecc091839bd0b6617f8332c35924f75c768c

        SHA256

        29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

        SHA512

        d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

      • C:\Program Files (x86)\cosstminn\04I.x64.dll
        Filesize

        684KB

        MD5

        5b557ca9bc92357eb76a8c576df86e6d

        SHA1

        a66eecc091839bd0b6617f8332c35924f75c768c

        SHA256

        29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

        SHA512

        d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

      • C:\Program Files (x86)\cosstminn\04I.x64.dll
        Filesize

        684KB

        MD5

        5b557ca9bc92357eb76a8c576df86e6d

        SHA1

        a66eecc091839bd0b6617f8332c35924f75c768c

        SHA256

        29cd1cde949335d2d55629992320462479188f220e973dbf844d8ac47aef4bb5

        SHA512

        d5bea462fd63ccfe590713b591608a358f356539309194c215975b597e366ef42044f6481b7ca8cc748dc6552d63e1e838ac977e2c120851b20986c1115e0b2e

      • memory/376-156-0x0000000000000000-mapping.dmp
      • memory/848-143-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-137-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-145-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-150-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-149-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-148-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-147-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-146-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-151-0x0000000000DC0000-0x0000000000DC2000-memory.dmp
        Filesize

        8KB

      • memory/848-144-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-142-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-132-0x0000000000400000-0x00000000004A1000-memory.dmp
        Filesize

        644KB

      • memory/848-138-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-139-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-140-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/848-141-0x0000000000DC0000-0x0000000000DC3000-memory.dmp
        Filesize

        12KB

      • memory/3084-153-0x0000000000000000-mapping.dmp