Analysis

  • max time kernel
    151s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 08:39

General

  • Target

    1db9b19cb422cef2a7211c98cf20a5c2b651fb7bfc90e25ac38cfddad0ca023a.exe

  • Size

    872KB

  • MD5

    b975f849631c3bdee73a78eb9f3c2dd9

  • SHA1

    586ba9d75a0907e1ad3577f48fd8429429ead3d8

  • SHA256

    1db9b19cb422cef2a7211c98cf20a5c2b651fb7bfc90e25ac38cfddad0ca023a

  • SHA512

    0b48f9c0afd7925dfc889545accc4f6f00ecf48a494939b1ba53d1f2e1ce72480472ecddaad375fcbb3dda2a2a1f4d8dfb1351d136e36c565898515d350e7036

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db9b19cb422cef2a7211c98cf20a5c2b651fb7bfc90e25ac38cfddad0ca023a.exe
    "C:\Users\Admin\AppData\Local\Temp\1db9b19cb422cef2a7211c98cf20a5c2b651fb7bfc90e25ac38cfddad0ca023a.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4356
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39e5855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3552
  • C:\Windows\system32\gpscript.exe
    gpscript.exe /Shutdown
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\adm\hu\y8st7IgDQzzWiv0EfXut1tIwnlURfZa0L3O.cmd
      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\adm\hu\y8st7IgDQzzWiv0EfXut1tIwnlURfZa0L3O.cmd" 1
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Sets file execution options in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4800

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\EdgeUpdate\XiyjlFm3ZkS5gXd9l0FNcNdxpeqxEfZW4muJCZqV6QLtvhIsZz4v.exe
    Filesize

    1.3MB

    MD5

    ef1517a26ab46206664d915ca1081702

    SHA1

    b0a4cd369a74bf5e68be2da9a0e05937347cc2ae

    SHA256

    8f55bc521eb72362dcf1e04b0273fad280949227cd4a9d18506ec5254ed720af

    SHA512

    f1945b5905c49378a176650dd2167837224767c241b3bdf1af7dacbfae48155bd32df6868d18b6ca3dd9a97ef2547103eeefbc59119cf707961ee212c570d42a

  • C:\ProgramData\Microsoft\Network\Connections\qxzpNBk2tR10dq6dYvZozcZqRjVaRh.exe
    Filesize

    1.7MB

    MD5

    145612a595d450ad057c14048478706c

    SHA1

    bc0546bf3e2c4e3af11745106509171608117feb

    SHA256

    ea4c93566f9d3e369eb410285cba00e57c953ab2f42786bf1c2f178be450d7a1

    SHA512

    f13ee833cec88ecc10e98bf4bd451491adc4f5ca9d2cddd13b1e2c08b416b8678912ee8a1724199ec1f2603bceaf3dfadf16dcf9e392a6691f1c15f6e38fc086

  • C:\ProgramData\Microsoft\SmsRouter\aiznfBCYZ5yxgx8LumT6atDjyqrjlIypH.exe
    Filesize

    1.0MB

    MD5

    56ef8412dcd8f76281d35360149bcf03

    SHA1

    fd1641a0d45ffdef736012dea888bbb162b210be

    SHA256

    a95b8ffe4c815d289728dd84d9703cd47621d0963999ea7d16244061f02baf76

    SHA512

    6efdbcd22b60a3f360a38df44d14659777e4b71de9931eb6acc306efa0276c00003353d3e71f5375e15bb162dfde8b773db7f456f98b55d3f9cc14115c889dde

  • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\jSKyHS05HQqFt0VTLOevpJNLyfivkSKuhaoAWrbeiPAUKx5yXpossf3mbdRa4Z9G.exe
    Filesize

    1.5MB

    MD5

    6255d16e453f5b32100886d60fe995ee

    SHA1

    0276137b93ad4a14bb7a3e11c28de35538eea03e

    SHA256

    55d307f5af0658ee0ec20fd2115d524bf3da05b6e09cb40abc88b9d50467baee

    SHA512

    79fa15342fca9a576db77cf0af4f3a5d184c160d1a9df3db79da53a0d209a9007a60975853c49bd8432f17c313b87a9e25dce1d81280f71d52d9715f20ffc282

  • C:\Users\Admin\AppData\Local\4G1XLwQ63aOVupVBGI17a7QFWqta480.exe
    Filesize

    1.3MB

    MD5

    96838ccabe7aa2ca62e81546692d68ac

    SHA1

    091267ef9b852a3e8b8dd55aa8a5b9b3508ebcf9

    SHA256

    5150a84dfb3563011ba9ac9921e16fb98b960c0d5b2c266d1a69b707c362f710

    SHA512

    a82f4c33bc53ae7f6b359bb52a971dd279d3bc5bf9a094e1bf483ed5286195a3cc0c0a597b40a6e70c2f9f86f093c276159bba17e9873c0e2d83e507e25d67c2

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\adm\hu\y8st7IgDQzzWiv0EfXut1tIwnlURfZa0L3O.cmd
    Filesize

    927KB

    MD5

    4d1303618067ec41992fc48313cc1245

    SHA1

    3f704800b405a6dfb7e483344ffb5ca65b0e33bb

    SHA256

    c7e787159155403cea32e1d2fd9044fb09a72ee55b4fe4cbbe9bb49d30c8c695

    SHA512

    2e5930c6902f758b18530bea6e37926724b5b005890d35c58d62de78713a860408d04816aed7edd48c021a28a0298f2376a2bf02f934a2ac3bc955912c65d1cd

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\adm\hu\y8st7IgDQzzWiv0EfXut1tIwnlURfZa0L3O.cmd
    Filesize

    927KB

    MD5

    4d1303618067ec41992fc48313cc1245

    SHA1

    3f704800b405a6dfb7e483344ffb5ca65b0e33bb

    SHA256

    c7e787159155403cea32e1d2fd9044fb09a72ee55b4fe4cbbe9bb49d30c8c695

    SHA512

    2e5930c6902f758b18530bea6e37926724b5b005890d35c58d62de78713a860408d04816aed7edd48c021a28a0298f2376a2bf02f934a2ac3bc955912c65d1cd

  • C:\Users\Admin\AppData\Local\Microsoft\input\lv-LV\JCor8u2CSzRUwPmsV61WxedDkI9QL11BiuwaqaSNBntaWSG.exe
    Filesize

    1.3MB

    MD5

    825d9f4e1bb67e597a50cb8a7d548a55

    SHA1

    cc73cf43e5eb9eea17641208fa8be13dca800772

    SHA256

    fcf023f468efd4312e64388b0ca7576258ce1cf48ab84883d01cce29707d24db

    SHA512

    88d8c7eab1971527f4f4bc19bbfebcd63493bc097640bc0905b0e1ac1efc4d466161585c020013c34d2a2e34cb71a2303bfd1d57df01965f2c59236828fba98c

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\AC\INetCache\qNqZEUnddCpgiV3hjJpWHYXNSLlim7V0DiDT5CLusYzd.exe
    Filesize

    882KB

    MD5

    47b2fe8f0822d5893787fc82536645b7

    SHA1

    cd17043c6c3eed9099719935c106b3fbc2b0241d

    SHA256

    694a22c36a8ed06c5979a3e0afa5167f1fed5e915c8e043222ae07a861e23210

    SHA512

    2a7f72a27880fb9b02cc842dc4e728cc1bb6c6e471386d52da990804801695324875cbbb7db761789e54f219ae045c8f5a2a936dfef49b8e874e90adc8762901

  • C:\Users\Admin\Documents\imvj3YmYkqYaGXf.exe
    Filesize

    1.3MB

    MD5

    d1d3498374e82b39e8f09e2fbdf9a1d2

    SHA1

    4838af97892ba4c1093f9821c39de9db08da0a75

    SHA256

    58a4a85a880ffe16d96aab00922a45459ce31dc42947933e8deee6604fbd20b7

    SHA512

    cc462948dc5eb38082444983f8121d85f9341c8b3189bff109a1dd21506c435f9c4f50b3ae907d4786420119041995fddfd5c3f343dcf1723693b80fb5a68a21

  • memory/4356-132-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4356-134-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4356-133-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4800-138-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4800-135-0x0000000000000000-mapping.dmp
  • memory/4800-147-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB