Analysis

  • max time kernel
    143s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 08:00

General

  • Target

    3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe

  • Size

    3.1MB

  • MD5

    b6372befbd19923949c9a7c09ce9a165

  • SHA1

    bcb15557790f4a3824b149f79d397157baef7e1a

  • SHA256

    3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6

  • SHA512

    b5e700515a2f0d9e925d46323f650fb125fea8a0877f69eb6a30f72b7b6e5add88eb26827e4672a8397513a6f99f484a72f5accdf244cc8d99408c9dbf46cbb4

  • SSDEEP

    49152:/0P1dPTfGFXbWydMmvDwAYIun1bdzRUhPXV48ntDQFIUDCGxw6ry/J6fj:cIdMm0IccvJnw9Zu/J6

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 5 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe
    "C:\Users\Admin\AppData\Local\Temp\3ff53358c9cbbaf11d55fdb135e5d0e752ae977ad18e5479286462b615395fb6.exe"
    1⤵
    • Loads dropped DLL
    • Drops Chrome extension
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:724
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\cosstminn\tMQr.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\cosstminn\tMQr.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1512
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:400
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
      1⤵
        PID:4964

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\cosstminn\tMQr.dat
        Filesize

        4KB

        MD5

        d33a0a2b64a2b81a72442b9515368901

        SHA1

        2ae32db6f565103e0443ed928caf5a3eaadb4751

        SHA256

        211da92c5e7476e10790a1673ac1070f616776122213d3b54efe24f266e97e10

        SHA512

        0f6c21abb9e2a9ad4c82e28b28a57858d69f269bed54aa64b3bcffd87dd1877c506bdfe7a6e4b775674604a4aebcb80d0456858f82f33450dcc5f9ec33171ee8

      • C:\Program Files (x86)\cosstminn\tMQr.dll
        Filesize

        610KB

        MD5

        8630a0477e33bf7e401c82bb6f0bf9ef

        SHA1

        d1933549c59d151aec77010e665d2e60eb16f24c

        SHA256

        29d95c7d6c79159bbe46dc7c8dded2c2fc74d7a15d36c3ece2f8bbbc06718888

        SHA512

        759b5148b829c44d81d8941a939b1bc17ddef7998cbc03f24e82c49378bbed57298242cf8178587636590d2965f4b45227f62fc95dae98ebffc39b5f0e503832

      • C:\Program Files (x86)\cosstminn\tMQr.tlb
        Filesize

        3KB

        MD5

        8956d96d82e1ff91bc7500ec1408070e

        SHA1

        fe73dbb0de2e727dd55073149490e7548826b42d

        SHA256

        4e83e6b729f8dcd42d0e2d8bac469f7cd696e6fbcb6f5edca8b91c3925b9ae5a

        SHA512

        9e8d87d5338d77f573787916500befbc49b93516713ac44fd8e98eb1698421c5ab536bc24071882c5179b6cd75df286c20306bde9bd59b5613f70ac53048ad15

      • C:\Program Files (x86)\cosstminn\tMQr.x64.dll
        Filesize

        690KB

        MD5

        3abba853e3f56ca70c68e2b5df4dd7d2

        SHA1

        c930ed364d473be5ea573dddee48d956e36e2c3a

        SHA256

        3d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d

        SHA512

        615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5

      • C:\Program Files (x86)\cosstminn\tMQr.x64.dll
        Filesize

        690KB

        MD5

        3abba853e3f56ca70c68e2b5df4dd7d2

        SHA1

        c930ed364d473be5ea573dddee48d956e36e2c3a

        SHA256

        3d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d

        SHA512

        615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5

      • C:\Program Files (x86)\cosstminn\tMQr.x64.dll
        Filesize

        690KB

        MD5

        3abba853e3f56ca70c68e2b5df4dd7d2

        SHA1

        c930ed364d473be5ea573dddee48d956e36e2c3a

        SHA256

        3d6dd31f0c3decfbc21205b543a72b2bc4a9406323bdbb7c995a2db31709249d

        SHA512

        615c75f083827a8a1117eae47debe00b411565550a9e35d58a35c83e739e822dafdc3c217a33429334547d0ced6e950c0336ac8224ffcf345fa56df10971c3c5

      • memory/724-144-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-143-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-132-0x0000000003200000-0x00000000032A3000-memory.dmp
        Filesize

        652KB

      • memory/724-145-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-146-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-138-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-139-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-140-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-141-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-142-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/724-137-0x0000000000F90000-0x0000000000F93000-memory.dmp
        Filesize

        12KB

      • memory/1512-151-0x0000000000000000-mapping.dmp
      • memory/2420-148-0x0000000000000000-mapping.dmp