Analysis

  • max time kernel
    34s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 08:47

Errors

Reason
Machine shutdown

General

  • Target

    73e3808a65aa8820099144e05cdb94012c7c909227a01bfff36bea0321d9dc7c.exe

  • Size

    1.1MB

  • MD5

    839f58325e233294f39cd8a96d28dc80

  • SHA1

    39a28db538a38e8e2ab74e9fd8ea146b3c1ec69b

  • SHA256

    73e3808a65aa8820099144e05cdb94012c7c909227a01bfff36bea0321d9dc7c

  • SHA512

    75de04069eabe3faef1c768c5464b59516846f31aff7d60e64eecc2c8181935f6c031bb8a97f8accde4552a2c8223758eb957c3e1933baa768b10edfeee0230e

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:668
      • C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd
        "C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd" 2
        2⤵
        • Executes dropped EXE
        • Sets file execution options in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
    • C:\Users\Admin\AppData\Local\Temp\73e3808a65aa8820099144e05cdb94012c7c909227a01bfff36bea0321d9dc7c.exe
      "C:\Users\Admin\AppData\Local\Temp\73e3808a65aa8820099144e05cdb94012c7c909227a01bfff36bea0321d9dc7c.exe"
      1⤵
      • Adds policy Run key to start application
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1612
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3984855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:4720
    • C:\Windows\system32\gpscript.exe
      gpscript.exe /Shutdown
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd
        "C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd" 1
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Sets file execution options in registry
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ja\IpRmZgy2vq3DBDIeaYHJRlgw2dbI2.exe
      Filesize

      1.7MB

      MD5

      49692418f8b37d8eaf866042baf0fe6a

      SHA1

      38d2b3dfcde9867d3ae4643de3a664027e0746f3

      SHA256

      562243f86a0b88723159fcb2394c67c98566aa1254cba5e7e51f73072c5f1316

      SHA512

      f376111ba466e8c40d8dced8be2e112d117bad01a6ea630999a76acedb5f583dda05c21befa90f34f93756677ff85e8ba7bfe0c9eacb00300b46d140f6a4b231

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\nl\ZF1hBmKCNMw2CE.exe
      Filesize

      1.3MB

      MD5

      6e7b96c57739e755cf1ced93a7e5a36f

      SHA1

      df96007b0ef500b0e72f92bf74eb271690ac247c

      SHA256

      8593366d5adfbe380d35e8a733edc892fa33b69b3ba5159739f98cbb524199e4

      SHA512

      6b13d9e43b6070ad88af66265e0c81e7f4cebd40b9cf840d8085fa60976fd7c6e7b35cdcbf803cc76e918bbebd8e44e9003ace5f5e0a1487295539e39d9a1351

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\te\nYxYmZCxYQd1vwMOfdIop9ErMo5MpotQ7EhqBcVn.exe
      Filesize

      1.4MB

      MD5

      d2cbde777699735da1a41dc2c42c9b6f

      SHA1

      02afc74845a74d6c8a8c1adfbcaec81da82ba50d

      SHA256

      7ac7cc49853c3bf5f183edc8b1d752d5d17b2012c33b861292a9280cb975354a

      SHA512

      5edb507024f9a4041c94edb7bbcf3030e637e389fc5f9cd3caca23b8909e15677dd4fda33c9d57f46721e632ad17e24090ebf0e5f2a3298bab0bdfa7546f0944

    • C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd
      Filesize

      1.6MB

      MD5

      333e6d175d436fcaf8fb48b8865e7b13

      SHA1

      af51d87e00d08f86622679620a956ca386225a2e

      SHA256

      3394b3d085e36afa6a018ca9b54a5ac63994c78f1fb198b4cecc84f66892bca0

      SHA512

      7a821a4fd08a501d97179e3f67af2cc3a1d98681db4f380d9c6325a10836dd291da9af0a2eebdf5762baa4e864e5ca0abc708d54c5823f1560902e1a6e7c6be4

    • C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd
      Filesize

      1.6MB

      MD5

      333e6d175d436fcaf8fb48b8865e7b13

      SHA1

      af51d87e00d08f86622679620a956ca386225a2e

      SHA256

      3394b3d085e36afa6a018ca9b54a5ac63994c78f1fb198b4cecc84f66892bca0

      SHA512

      7a821a4fd08a501d97179e3f67af2cc3a1d98681db4f380d9c6325a10836dd291da9af0a2eebdf5762baa4e864e5ca0abc708d54c5823f1560902e1a6e7c6be4

    • C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\ZOlLVY1RPVvYm54LEv9dsZXggBjTleKbCmv6rOa6F1GVJaAeVXj2p.cmd
      Filesize

      1.6MB

      MD5

      333e6d175d436fcaf8fb48b8865e7b13

      SHA1

      af51d87e00d08f86622679620a956ca386225a2e

      SHA256

      3394b3d085e36afa6a018ca9b54a5ac63994c78f1fb198b4cecc84f66892bca0

      SHA512

      7a821a4fd08a501d97179e3f67af2cc3a1d98681db4f380d9c6325a10836dd291da9af0a2eebdf5762baa4e864e5ca0abc708d54c5823f1560902e1a6e7c6be4

    • C:\Users\Admin\AppData\Local\Packages\1527c705-839a-4832-9118-54d4Bd6a0c89_cw5n1h2txyewy\LocalState\3831rAeNbCP8SW.cmd
      Filesize

      2.7MB

      MD5

      8e4e821f55ac7c8fa04a5e008bbe09e3

      SHA1

      9f369049a4c2531fe47019c867aaa07ef8db6866

      SHA256

      8ddf16265b5724632228643b6884c13c32b7ccafd53cd38dc95931c750b4ef83

      SHA512

      b4d663efd606d2c9f99eaa735b1680fa51f87e3bc0a87387fe46510db32002f6a5f2d2440477c1bec5afa28a5774c2514835f6a3a0ac688459cab5d4461bd8e3

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\Settings\WiaNIOp7IM4uKL2qoWHbATgG8gURzqaoeroC7Z5eFs0a1.exe
      Filesize

      1.5MB

      MD5

      7ace29e2b5d6a399d827b02da7053ed8

      SHA1

      99087233a9e5b014d22c46d9ee52509fd3e70b2e

      SHA256

      6940a563cb0b3326ac7733ff48b1712086585beb9f91272d74cfdcce8607b503

      SHA512

      03361c9adf4e8dab4ac13817fac7f545a345bddcdce88cf88341244daf2af05b7dd13b5e1dff267d3482598e60081cd29543ba1c5c35d1bc3683ce0582f45306

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AppData\fMA10TcOQGez.bat
      Filesize

      2.5MB

      MD5

      d5158eab648f1f142f4b17a161bbe68a

      SHA1

      a676969f1e6ad8a802e46bc5a475a81a89cbec68

      SHA256

      8e3e94315e2c4d4404c3d53629e8b77aa49a1049e01a29da7a58907a6b1d9e45

      SHA512

      ff8bb11d9349b558ecd1ee2f05c85c334e1dd52a415193695d0cc69860fc73b1b74047ea962bfff775e03c0b0c3ebe674f1e3015d21632726f9c06e5fd5eb17b

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\AC\Temp\jixPeL5hf6z66a08mcILmYHWRmE08AUtBJMEDTNmIIIbNyumeGP4bXw5trWO.exe
      Filesize

      1.7MB

      MD5

      99839aab9e8be9edc9adf869391f085e

      SHA1

      a4da3bb5081827efab0f1e2397460893a8d69a1e

      SHA256

      8d32ed74c52a44c5d27774fb9a54bf35200debff005cfc7ca237d3117864a354

      SHA512

      725cb602fa207c250c1c64d85a3b7d8cbd4dd2d95ecd0e6721fd9c3e4107d2662c339cc47abdea3cd7abf964e5038d1428aaa0826897d1c6664bd3c424ef9572

    • C:\Users\Admin\AppData\Local\Packages\windows.immersivecontrolpanel_cw5n1h2txyewy\AC\1siaAsVLFLlkWNzXeQJwDG04ryOl6i4z9zlsKAl5sRE.exe
      Filesize

      1.8MB

      MD5

      d35bbbc875a3422688a691d413abb30a

      SHA1

      f71449fc3ac326902c466903e17156372c4a5a9f

      SHA256

      96215c6b17a157ca4d40f6857cbc79a46334e35aa709a5c972094638dc644588

      SHA512

      3f964ac923f179855617d8b675807e160ab16772939dfa1125b923fbd4c3f102aa68093ebaaa84bb78d27c656a3cb5d72d658c217a371b22423f2f055ac6eee7

    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\LLIq43BkSUoKdQc1LIytgxQ.exe
      Filesize

      1.3MB

      MD5

      df2dd59c576690369ba9a27ab6543454

      SHA1

      15b3440082663478d5b14993e997511429d44183

      SHA256

      efcf9b148a80d19719ce263226ccd0e774df1b5bba3f59d4698ecf733c1de205

      SHA512

      49742c6ebfc88b179a810a9e4c74ad2a3b75a3d076ec586fb02ae3f07fb9637ab31e549e23e837bbd82ccf69a54a151365780fe34e56e7d028fda1a8d628ebef

    • memory/1612-132-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/1612-133-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/4644-146-0x0000000000000000-mapping.dmp
    • memory/4644-151-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/4740-145-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/4740-137-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/4740-148-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/4740-134-0x0000000000000000-mapping.dmp