Analysis

  • max time kernel
    155s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:43

General

  • Target

    fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe

  • Size

    518KB

  • MD5

    25e285099137741bcf79b1f1d856642d

  • SHA1

    93b9532d874aeca9211066c6cc726d062eb092b3

  • SHA256

    fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6

  • SHA512

    14d1a10fa565c94964213fe908b256e385ac8b9ba8f18e8b150338e1fccffe21b640f30a7f9189c72d070b6c8fb84dbfe767dab834b20b533ea51baa0cecb584

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 58 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1272
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1052
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x57c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1504
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1972
      • C:\Windows\system32\gpscript.exe
        gpscript.exe /Shutdown
        1⤵
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat
          "C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat" 1
          2⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Sets file execution options in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:1068

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Search\Data\M4LKLrEnb7N4woqa1LqxrJCef4SmQhzRr1z9fOvr60ZynZn9SKy8uEEdKh6TcZ.exe
        Filesize

        665KB

        MD5

        780d4a2adedf553bb463b2edce39758f

        SHA1

        42b123d865f705d43a871b3505e813f463ca772c

        SHA256

        7dba15c9e124cd66a2f5f84a64e6ba06f48003d8c4c6466cabc02445ee1b5259

        SHA512

        3f72840c0e26e4f670c06a7493f6b7893f0fae35c6f0ae01db3ded667432bd7f93c6059fd715d62d04f6e43179e35e494d609ef05cdfc1b148ddd7341ce4d10d

      • C:\ProgramData\Microsoft\Windows NT\MSFax\Common Coverpages\de-DE\MAK7fO6CnVbCxkyRMmCuZNVSS6sXwB6B7uNFqRkaGz.exe
        Filesize

        947KB

        MD5

        4feebc706127ffe5499b22b5d7be4eca

        SHA1

        bb2f4412cb8920ea1e02e3c73f98e3ea3d4d141b

        SHA256

        ca86d125185364f966d6271e447deda512f69c554f02bde9338071ee019ccdf8

        SHA512

        1384b49501b776d185c69ff8e78add9c2c86364e55b0ff60c42f9d3a552a09761c7bdd3831702dc0361cb4e9fd5a343429192a7b4bc028f2e9a71d9451e4fde2

      • C:\ProgramData\Microsoft\Windows\DRM\Cache\9zDiQC40xLVaMRFR.exe
        Filesize

        975KB

        MD5

        8751a61aa5887b2d1a031f2a5f40c2fa

        SHA1

        d5efa1ebddd373d125b3de0b88b25e5a3071a26c

        SHA256

        821392911c659b48bd1c48bfbefacdc109af1a65936d60ad2946cfc3ca98644b

        SHA512

        a03e302a75016c3091108d9073a06c1629af7e3d2e6c26a26fbf62e944e2c52cb2416549edafcae8e3d718635f08b89405285d127de51629b1a22fbb36cde3b4

      • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat
        Filesize

        985KB

        MD5

        84685197e442cd03d2c5d64fbaf99f02

        SHA1

        360eb40ccea878ddbcffc060358ce7f251b14987

        SHA256

        7a5d24d774e26a9446efefe50ece163af9f0677fd17a4e37e238c7381e8e18b9

        SHA512

        15ef87d92a67a44ba62f531a05af4e7ec9ccd2dca3bbd488d8476435060376fe2999b1fb2bd5145dda3b2b6b9fa08328eb90555b4d796dcbf656be7b18b5396c

      • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat
        Filesize

        985KB

        MD5

        84685197e442cd03d2c5d64fbaf99f02

        SHA1

        360eb40ccea878ddbcffc060358ce7f251b14987

        SHA256

        7a5d24d774e26a9446efefe50ece163af9f0677fd17a4e37e238c7381e8e18b9

        SHA512

        15ef87d92a67a44ba62f531a05af4e7ec9ccd2dca3bbd488d8476435060376fe2999b1fb2bd5145dda3b2b6b9fa08328eb90555b4d796dcbf656be7b18b5396c

      • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\UQJKVP0QYXzLsNhoFPZiXXUT.exe
        Filesize

        683KB

        MD5

        9abd663aad24739b8bb04c982a4246e7

        SHA1

        1a6c570d3c8a8389c3c3ed32690cc4bd5a73a64f

        SHA256

        b993e94ff3c27d176b4fa61143284a6842ab5fddcad9eba3c0e5b0b97854c8d3

        SHA512

        ed1f8f5ebead26f1d8e89cfcea1eceb1142c7677f4d4364008b768082640b568904696a94e22de8e3f85570e54d26cdf1fe508f2e3f8ad1b5c474dd3775de668

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\TabRoaming\iS5oT0G9PyPJgU5kbb5u9qADubF8kAYfPbvx872ABdrgs1JltSiRha5ztgGt6IUCsa1L.exe
        Filesize

        619KB

        MD5

        1849b6c52ef38d5ea801d604bdc60d09

        SHA1

        157ca8661010677ec8a755723ef087771bf7411d

        SHA256

        0a5538cbcdf94b41a0cb74a4e1fa5cadc2651206b0eeaf9ab6249ca0b752f255

        SHA512

        73d19be8071c2186ddb02b5aacadff4e567f0b2d0dd63c2f4cb6c515b28e5afe99af3edaeab8bb3a062e93148af230f93770c02061a43a5b17305466398c69d0

      • C:\Users\Admin\AppData\Local\Microsoft\Office\Groove\System\WQkiAc7l7wub7rMGz9nZy7b2HXzdfo5ueFmCoFu4kM9MeErM.exe
        Filesize

        964KB

        MD5

        8b9b89587dc96cf50c37f7ab0bdeff7d

        SHA1

        04455e923da965646088f0dbc20d5893c1c4fa17

        SHA256

        603cf59ed4e3c8551ed6bd5fcd0f10fcb80e844d7ed81ebb6cd3092856a60e52

        SHA512

        7d8dd643a9657dcdbed008e1975e92c629e9ccbe3cd83663a1d8b9feedfdcfd53d5f3d7bf72b697ed9c10b07665ba92de669b1ce7172ed4aab02583411805431

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IECompatCache\q6TeCNTZ30QDlvocTA1ky1lRBmJ8KRprWbjVmTYkf.exe
        Filesize

        522KB

        MD5

        611b3d5f104ef3e805271abbf8b16b2a

        SHA1

        1380f3f0b10d46c00729446497bf2eb9ceb3176c

        SHA256

        81ea4fb1626494fbe621a72a874e44e25511bba326b7242e472346d52d4a3dda

        SHA512

        9827a9b194585b2fa2451f24d3d3fcb2515e120402a0e11c76e43e434d0dd29e919ad8b6b9fa343a719fe66c43ab864bfbbf65c0fd0783ffcc23159ab4f99a5d

      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\16jzCs1gu2XPSHPaeIBYizWwBoMEMcbdoiqecraRBnOhT9N40vors.exe
        Filesize

        663KB

        MD5

        bb755a8eae89b1c5fbcb2947650685fb

        SHA1

        83a887a67dea7f8b2e149f7842bb6be61b319a43

        SHA256

        69c1abaa8a36593c7781bfacbeb74e050a2d7da5f811387485f6b9897102866e

        SHA512

        722bb135409488818f0b1e7ea4e90510de48a0d11cbda26c4cefd56f540b31f8e9dcc962dbacf4e2f14d5da8e87cf34b3063974e21301c2ff75349c3cd273686

      • \Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat
        Filesize

        985KB

        MD5

        84685197e442cd03d2c5d64fbaf99f02

        SHA1

        360eb40ccea878ddbcffc060358ce7f251b14987

        SHA256

        7a5d24d774e26a9446efefe50ece163af9f0677fd17a4e37e238c7381e8e18b9

        SHA512

        15ef87d92a67a44ba62f531a05af4e7ec9ccd2dca3bbd488d8476435060376fe2999b1fb2bd5145dda3b2b6b9fa08328eb90555b4d796dcbf656be7b18b5396c

      • \Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\x51qjcNJqhm9Ait1eAVJCIvpAALweBgk48q.bat
        Filesize

        985KB

        MD5

        84685197e442cd03d2c5d64fbaf99f02

        SHA1

        360eb40ccea878ddbcffc060358ce7f251b14987

        SHA256

        7a5d24d774e26a9446efefe50ece163af9f0677fd17a4e37e238c7381e8e18b9

        SHA512

        15ef87d92a67a44ba62f531a05af4e7ec9ccd2dca3bbd488d8476435060376fe2999b1fb2bd5145dda3b2b6b9fa08328eb90555b4d796dcbf656be7b18b5396c

      • memory/1052-55-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp
        Filesize

        8KB

      • memory/1068-62-0x0000000000000000-mapping.dmp
      • memory/1068-66-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1068-78-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1272-54-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1272-56-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1660-65-0x0000000001050000-0x000000000107D000-memory.dmp
        Filesize

        180KB

      • memory/1660-64-0x0000000001050000-0x000000000107D000-memory.dmp
        Filesize

        180KB

      • memory/1660-76-0x0000000001050000-0x000000000107D000-memory.dmp
        Filesize

        180KB

      • memory/1660-77-0x0000000001050000-0x000000000107D000-memory.dmp
        Filesize

        180KB