Analysis

  • max time kernel
    99s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:25

General

  • Target

    4cf91235020eae322d8591d850d3982eb7f6bd18fb2838d322adbfd620c0924f.exe

  • Size

    1.3MB

  • MD5

    de0a6c3bd90ba04ba7e222c2342eb83d

  • SHA1

    596731db56a389b656f6cb1557aac8965f8f20e6

  • SHA256

    4cf91235020eae322d8591d850d3982eb7f6bd18fb2838d322adbfd620c0924f

  • SHA512

    aa8b78be9ba123cb81437b9dfde7835fc2243c677fb278e7093727c322cd6b73df0e9da0e18f23e0629caee8326bc8aeea4aec7c4a1c73be339ff19065198bd4

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies data under HKEY_USERS 37 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cf91235020eae322d8591d850d3982eb7f6bd18fb2838d322adbfd620c0924f.exe
    "C:\Users\Admin\AppData\Local\Temp\4cf91235020eae322d8591d850d3982eb7f6bd18fb2838d322adbfd620c0924f.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1360
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2016
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4bc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:268
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1012
      • C:\Windows\system32\gpscript.exe
        gpscript.exe /Shutdown
        1⤵
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\ProgramData\Microsoft\Windows NT\MSFax\SentItems\kFaUhuepfZZbN4RdVivU.cmd
          "C:\ProgramData\Microsoft\Windows NT\MSFax\SentItems\kFaUhuepfZZbN4RdVivU.cmd" 1
          2⤵
            PID:1644

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Windows NT\MSFax\SentItems\kFaUhuepfZZbN4RdVivU.cmd
          Filesize

          1.5MB

          MD5

          1963756e61dab7a48edd1818172eb1c0

          SHA1

          c29b874a84cc7efb0fac2bebb914cb493ddf6897

          SHA256

          eba64736d88322325682aeaee8d7c12256b5417331c4bab3584bb8eacfd08361

          SHA512

          7565304f28b5d91d840f82896318aed5f94b28239c85957f30b4e517c9d6ae1eefa38a60405d9b6bd8e91d3df4b5b17d962ada0f02d14af0e4e27acc04ef5def

        • \ProgramData\Microsoft\Windows NT\MSFax\SentItems\kFaUhuepfZZbN4RdVivU.cmd
          Filesize

          1.5MB

          MD5

          1963756e61dab7a48edd1818172eb1c0

          SHA1

          c29b874a84cc7efb0fac2bebb914cb493ddf6897

          SHA256

          eba64736d88322325682aeaee8d7c12256b5417331c4bab3584bb8eacfd08361

          SHA512

          7565304f28b5d91d840f82896318aed5f94b28239c85957f30b4e517c9d6ae1eefa38a60405d9b6bd8e91d3df4b5b17d962ada0f02d14af0e4e27acc04ef5def

        • \ProgramData\Microsoft\Windows NT\MSFax\SentItems\kFaUhuepfZZbN4RdVivU.cmd
          Filesize

          1.5MB

          MD5

          1963756e61dab7a48edd1818172eb1c0

          SHA1

          c29b874a84cc7efb0fac2bebb914cb493ddf6897

          SHA256

          eba64736d88322325682aeaee8d7c12256b5417331c4bab3584bb8eacfd08361

          SHA512

          7565304f28b5d91d840f82896318aed5f94b28239c85957f30b4e517c9d6ae1eefa38a60405d9b6bd8e91d3df4b5b17d962ada0f02d14af0e4e27acc04ef5def

        • memory/1360-54-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1360-56-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1644-62-0x0000000000000000-mapping.dmp
        • memory/1692-63-0x00000000010B0000-0x00000000010DD000-memory.dmp
          Filesize

          180KB

        • memory/1692-64-0x00000000010B0000-0x00000000010DD000-memory.dmp
          Filesize

          180KB

        • memory/1692-65-0x00000000010B0000-0x00000000010DD000-memory.dmp
          Filesize

          180KB

        • memory/1692-66-0x00000000010B0000-0x00000000010DD000-memory.dmp
          Filesize

          180KB

        • memory/2016-55-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmp
          Filesize

          8KB