Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:54

Errors

Reason
Machine shutdown

General

  • Target

    e2575680a9a2d591cd9a98a3f6e8d96e76e3b41e074fec20d27e59f3a71d8ace.exe

  • Size

    762KB

  • MD5

    d4613fbc01b0bbae29b551d2b488c340

  • SHA1

    64b44d40edd7ba7eec619d24d5af38caa74ecf35

  • SHA256

    e2575680a9a2d591cd9a98a3f6e8d96e76e3b41e074fec20d27e59f3a71d8ace

  • SHA512

    7cccb0caccb0b135da6d9404775d46f8798f4e626787c93c21c256626d1e902202eda6a013d6784eda140d79ff95150fe55e5e605199ae981562c0eebd53d8cb

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2575680a9a2d591cd9a98a3f6e8d96e76e3b41e074fec20d27e59f3a71d8ace.exe
    "C:\Users\Admin\AppData\Local\Temp\e2575680a9a2d591cd9a98a3f6e8d96e76e3b41e074fec20d27e59f3a71d8ace.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1744
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    1⤵
      PID:592
      • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
        "C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat" 2
        2⤵
        • Executes dropped EXE
        • Sets file execution options in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:1772
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x558
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1980
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1280
        • C:\Windows\system32\gpscript.exe
          gpscript.exe /Shutdown
          1⤵
          • Loads dropped DLL
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
            "C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat" 1
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Adds policy Run key to start application
            • Executes dropped EXE
            • Sets file execution options in registry
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1428

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Search\Data\Temp\U8k9b1XZoBlmORkcqpVdagfUlTy274wy5yOo7fmfIKFlhDtn.bat
          Filesize

          1.5MB

          MD5

          969b97989e498d443693577b07ef5c24

          SHA1

          c92145f3813b708922c4db15b1630fee0825a329

          SHA256

          aae5bf50111546cb5c12bb83d70ea46946a4a80d8b21979cadfd2529f2e59058

          SHA512

          1164490528483d37d1f8a7b499cef13f12ba079edfb342ff37b975709ae4693ec8a064310551281d29a4a8a50fe5422a9755e6308ed6a2e12525c11988d67a65

        • C:\ProgramData\Microsoft\Windows\AIT\9IovQk66.cmd
          Filesize

          1.0MB

          MD5

          ef15d5fd50f145d45955c13732d99eab

          SHA1

          46c294c0dd55afa17483a5139d5e118657001df9

          SHA256

          a1b1b663a616f5de105b376237f813f34ad762cf4e60410cea01c198a0145436

          SHA512

          2823e69de294a9414fd937cf4bad12e12799d8daf7e72198dad1cf6e3a67372a538b41f580e69eb760334b849bdd1b5514c049c302fef3208d95370067a35216

        • C:\ProgramData\Microsoft\Windows\DeviceMetadataStore\fq7DaSCiRnx7Yg9VxGI2ZREtoMIwK0TeGBcv1vwahr6d2v4rh4QB.exe
          Filesize

          1.1MB

          MD5

          166985cd3a2878c22f03a5ee3b720435

          SHA1

          09898fc9c08fe557422d8f815a52682a1ca7b243

          SHA256

          6b4ac3323a30150d167272342078fa5e8561dac0f868db2ebcb850aa10a48634

          SHA512

          b699b69356ae1d76cd36b69a994e4147ddc2c4004b8da093f527634badab2ff18cca007356837ec75ab2aeb060ff9f0fcbbbd4d78b7109bc4015911dffa5fac7

        • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\AutofillStates\kFna2sLCYh.exe
          Filesize

          1.3MB

          MD5

          2287cf7ca7331d487e34f7b3a4f3449f

          SHA1

          2ec2d03070f9b56efc990b921770b9f0a833e748

          SHA256

          9c4f983cbd04f0fe5de4c05727c6fc5d2b9065f9d624e80bd3f2272aecf643ce

          SHA512

          add063a431e35e6a49e795e9d5a27755fc52ff44f097acc23aeb860391950b80fbafced1080acc5c34e25413dd1890c42ca600afe57edd63799455335846f99e

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\blob_storage\qzfuAmu7yXVMBapLXteINyNlobGIwcYX0Y.exe
          Filesize

          999KB

          MD5

          00eb8b621d4e32eee2da1e6de36651fe

          SHA1

          4ce3c8f077a9109847c6c9a1fe0bf8edeb782f59

          SHA256

          b423b0e25f902cac794d5caeebd964916d47c66032a4601d4974eaaaebd2fca2

          SHA512

          189d2332201b5c058b97c7470e7887896b832e3a8dc6bde87e7114aa6a66f498374038f15145ebcf2c2b384fddcf415dbceb0dc63efd8f582e2ec885567cf7e1

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\iCC0ZywY2wb7upRuibNBzWLJW6UyWS3KRRNt8emCL7EEDwEAZQWMigwmmQ5m.exe
          Filesize

          1.1MB

          MD5

          da7a87eadf8a9286e416e639cd24dfd7

          SHA1

          d2047087b7f998e2eb45dbd70479c7d8381720d6

          SHA256

          c15fc5ecc36497c41de14c3bbcb5e2450fed5d02f571c5c72ac0c0653eeda7fe

          SHA512

          782ac5d76b643e1de46f4480b83a4d058655da8de981a22a44bc3927297358ddde32182d3106eba05c6dca46b0203129e95f36503a3d06e533f24e5fafbf9cb0

        • C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\IniUtMw97.exe
          Filesize

          1.4MB

          MD5

          31dea38eac30e9d62785fee2a7247276

          SHA1

          0b23538cc0e5c58bbdfef12db1fe38867bbf5a27

          SHA256

          5e6654fa1156ea245dfbe375779de6df47ea66c9c556d05f9eb2560a99fb89bc

          SHA512

          3e2bd203ccbab5adfe58ed51d2102f3f625ec6798c380dd442a60c7140b2e1844858de898e7c7451fb7c4b5b441d16fa0396d5d1256cdde886c0daa9cb274972

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\Collab\5kgtuJm3F2GzQanvNmp3bK5lZpgO99Ev405PoA1hKU3bFYXyJnsJj1oBhbBXiTgj8.exe
          Filesize

          991KB

          MD5

          f02d1541dbb2f87ad1ad18273d4901b8

          SHA1

          87dbc06ef0762edfaa4752a65ea3de1e7062f0ab

          SHA256

          2d8ea21ca434006b9540e4d84e696bf858132290b958c20cdc3eb00538c42a20

          SHA512

          421cf7e18ba19409f2c1379c8fca39ab64c84e40512b54f57cf4881b4614c85f0ba7eb45314ac5b245934f3678b8a166cd70a374a21b07f6683c97a9ff048a33

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\zDgihWI4CHqtDFQSamB8ENG3OpjywTxZKFE07kAOBfqIQ7udK2hSnjBZOCty7WTcBsNVeSJ.exe
          Filesize

          1.2MB

          MD5

          b720ee5b1b13595910e3ccce22ad0cad

          SHA1

          d6bb847ed48220bc491b6f5e48e858b486263efa

          SHA256

          32900c4f7a4f2e5ccfb621a292bb4564d791640c2dd04b4d0c1fd3583ddec533

          SHA512

          99ba6242efa73303fa95480cb85575bee831be02e90e122a10a25612724c768bbbe860700cc723bfdaa3cec3fe0be646e0f85b8f55a9b61b981b5b0b9c3dccf2

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\storage\temporary\KgeADUp0SWG0RPDuVpUEWNwJ.exe
          Filesize

          938KB

          MD5

          fd37730499128bae22da441879fd135e

          SHA1

          38ee97351bff6a794c6583881eaa94a42e9398e6

          SHA256

          01a9dc7e625d957fa5c3c7769c900c54d79c6d68c696ee220afdf3d54d0a0ef7

          SHA512

          e290240b68beb6e0cb7c8cd20a773cefe3cfa17f73f3a9d514a43d43956f908e8a72a03ed378e0366fec141c6118a542383ab9fdbd7daaa574c58cbb4e6a3d66

        • \Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • \Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • \Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9wyna9wpPdyCU6rO5xttyMNqcOSCJAmmipySvpWDnyzVHEkpTyTfDcxObckTC3JCbA.bat
          Filesize

          971KB

          MD5

          7e1adc4418959ed4104753e62ad34b78

          SHA1

          91a72f7864a2f0c8eadbd5f3ea7fc14dae0ac943

          SHA256

          4733be536a423556c7799df7227272e4b3c5ef984924526e151351cecf4b95e8

          SHA512

          53da02338c7c6deed35464f4e00a76d63f74b0b3c4fd1137e52caa4737c841eb219c5fa360de002efc36368aa5a2d9b0dfd3b741c2a10c587ff93de98a69d64b

        • memory/1328-87-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1328-84-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1328-80-0x0000000000000000-mapping.dmp
        • memory/1428-78-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1428-62-0x0000000000000000-mapping.dmp
        • memory/1428-82-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1428-83-0x0000000001A90000-0x0000000001ABD000-memory.dmp
          Filesize

          180KB

        • memory/1428-70-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1428-88-0x0000000001A90000-0x0000000001ABD000-memory.dmp
          Filesize

          180KB

        • memory/1732-77-0x0000000001120000-0x000000000114D000-memory.dmp
          Filesize

          180KB

        • memory/1732-67-0x0000000001120000-0x000000000114D000-memory.dmp
          Filesize

          180KB

        • memory/1732-76-0x0000000001120000-0x000000000114D000-memory.dmp
          Filesize

          180KB

        • memory/1732-69-0x0000000001120000-0x000000000114D000-memory.dmp
          Filesize

          180KB

        • memory/1744-54-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1744-55-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1772-56-0x000007FEFC481000-0x000007FEFC483000-memory.dmp
          Filesize

          8KB