Analysis

  • max time kernel
    190s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:27

General

  • Target

    e5d3eedc0c2547f9c724e874e27873f86bf5059ef5fa3b9d48fe128ea771e6bd.exe

  • Size

    859KB

  • MD5

    9f29d49aae32c865aa36a4bea4a48820

  • SHA1

    1e061707d14718d7c2a3e8e109a5398f0afc3a19

  • SHA256

    e5d3eedc0c2547f9c724e874e27873f86bf5059ef5fa3b9d48fe128ea771e6bd

  • SHA512

    8ffae3b8e4f19d10973b5a911a23ce5106f0ffcfc4035a045e17d008e79d3146543320efba46660c7eadbfc0f6174fe159f33f7fdf2913d2f70df88273173777

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5d3eedc0c2547f9c724e874e27873f86bf5059ef5fa3b9d48fe128ea771e6bd.exe
    "C:\Users\Admin\AppData\Local\Temp\e5d3eedc0c2547f9c724e874e27873f86bf5059ef5fa3b9d48fe128ea771e6bd.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4296
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39f4055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4608
  • C:\Windows\system32\gpscript.exe
    gpscript.exe /Shutdown
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:312
    • C:\ProgramData\Microsoft\Windows NT\MSFax\VirtualInbox\VBGFn923VFWgaKiNtzIayPL21Wr7Zr6UTmf2zear9NEOMJOQ1QJ3uaW7QcopjHKReM.cmd
      "C:\ProgramData\Microsoft\Windows NT\MSFax\VirtualInbox\VBGFn923VFWgaKiNtzIayPL21Wr7Zr6UTmf2zear9NEOMJOQ1QJ3uaW7QcopjHKReM.cmd" 1
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Sets file execution options in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\es-ES\MzSkaJz6YdqCkBA5yyg6T.exe
    Filesize

    1.5MB

    MD5

    d4987dcb3dddb139f2ac2c15015eb8f7

    SHA1

    bdb36c4463e447903bc6f20448b52a3cc4d612bd

    SHA256

    c7d324a83c51db8a7669bfb119f224784b9e9af354893f60f8783f713124ec77

    SHA512

    1e803346c76362397b3d7d49e25a03077467e8f22ff4c875161cac0d6717cc87ead1b53f0edbdb9a5f9cec41b8bc0d742112c6682fbbea25ad1b450b316dbd3b

  • C:\ProgramData\Microsoft\Windows NT\MSFax\VirtualInbox\VBGFn923VFWgaKiNtzIayPL21Wr7Zr6UTmf2zear9NEOMJOQ1QJ3uaW7QcopjHKReM.cmd
    Filesize

    1.5MB

    MD5

    78ae651e022d141bf8acf0921dcf4f61

    SHA1

    28788f2a311e26d6a853212156acf5dbc636fd2e

    SHA256

    31cae976be857e4f7b3d64c9cc953b4b69e4ce368507d05e28b1cb53c36c36ec

    SHA512

    cd168fa113b2b2a055761ef167c727f44c748afc4e2f28c62bd90076ce775c32d0891b279a154d0b0c7b2977574c8945058b6ef2783902c359492b51b1ad9159

  • C:\ProgramData\Microsoft\Windows NT\MSFax\VirtualInbox\VBGFn923VFWgaKiNtzIayPL21Wr7Zr6UTmf2zear9NEOMJOQ1QJ3uaW7QcopjHKReM.cmd
    Filesize

    1.5MB

    MD5

    78ae651e022d141bf8acf0921dcf4f61

    SHA1

    28788f2a311e26d6a853212156acf5dbc636fd2e

    SHA256

    31cae976be857e4f7b3d64c9cc953b4b69e4ce368507d05e28b1cb53c36c36ec

    SHA512

    cd168fa113b2b2a055761ef167c727f44c748afc4e2f28c62bd90076ce775c32d0891b279a154d0b0c7b2977574c8945058b6ef2783902c359492b51b1ad9159

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\rz6AkMZOs2n41zinuxoX7NCXPWTUeuP9cfAmfrjccHo.exe
    Filesize

    1.4MB

    MD5

    8b56058cb634a561005cb1e79594e22f

    SHA1

    7ebf3883195233911e40fec66c6676b1dd29cb1e

    SHA256

    eb301eaec428435cb038202416b8bebb36cb3caf579f6a89096b5360729e187f

    SHA512

    9f2115ef8f9133ac46d0a75cd41823738bd9b38b67fb917176919a9f457bb38bfd7a87f77597a561c2cd4c5d9e8cb5bc2879295eaa4f78dfa2e989e4b907f2ff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\AppCache\MWCSTFooJ5KwaDHymZQaCpakBp5jdYtBkmW.exe
    Filesize

    1.5MB

    MD5

    e10531fbf771dde4565744fc58e24e7d

    SHA1

    eeab4c54c480eec4e7493ce7cd07b9e36773dbf4

    SHA256

    971eb4c4635e083a421439594cfcbafd0a5ce9f95ddb9d16e5e3d282c76ac813

    SHA512

    1726156f73202575bca3e21fe63e2d35ed9eda1527e46a2aae38e0f857d4de9f2682617b1a6d9471b78bcc2ea46fba63368ea8fe5240d981557249699906b87c

  • C:\Users\Admin\AppData\Local\Microsoft\input\ar-SA\XX802h4UJ0FmunRw7o9lAgEn7WVjswEA87Z04zmyRT2jL9tSv8K.exe
    Filesize

    915KB

    MD5

    29cefe06863993920f00b8a061ff298f

    SHA1

    3b6d64f18915a93bc5b3257d98b662d334e576a2

    SHA256

    cdc7eedf31b77487d3efef6721811612f059af291d7b0abd0b7ddce2b1d078ed

    SHA512

    e0030ac3de65a33ebb458c34d01edf45dc2c9f0ed4fae2a33cd1e8dc589903638d644c8e9e1c470681bdf153d1663be535d32357ab8d539396ddb1e3ab70c45c

  • C:\Users\Admin\AppData\Local\Packages\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\HkTQXgyPaz41FoipCM.exe
    Filesize

    1.6MB

    MD5

    2e8b391c36ba0608eb9139e37b8f74c8

    SHA1

    51b10d8b3133553560dc17aa82aae4fe1d01cc58

    SHA256

    05b28ebfc74bae4bbf815494a60a3e62e1f0ea0a30ea980c2e6d9166615bc4aa

    SHA512

    5a8936a1a08c9bacc7b4e1ed496ef81be251afd9604c97db3041e42885b48c8e1375ff8bdaad197a00bcafc6f48eda0dd0bcf27d49b819f1e102887678696a48

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.ECApp_8wekyb3d8bbwe\AC\INetHistory\Fq379uhIbD1oQeb0UwuLC3P4iGkwBjq4.exe
    Filesize

    861KB

    MD5

    e726af1db3006f551e22a2d841b9dda9

    SHA1

    f91401c29a07ff85053963730babe406a9dc85e0

    SHA256

    54c9c2a377513a19a7a985f2146363ecbab6dc97ee1cfab5618a12985819111d

    SHA512

    d916879ec66bb660ad9d24578fc9e1e1f90e4f1cac11c5217cccd53d8fe41349b51a4cbc5bd0b483dfdbdf847508fedabb3713aa817f31c821b561c83e1e642f

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.ECApp_8wekyb3d8bbwe\TempState\mrK4mPFq6Xb9PakWeIST0fld6wvxjEyo1rKyzWVMrxo3mlvuw7gi2.exe
    Filesize

    1.2MB

    MD5

    e884321d0a8c918fea411b6cc3d850dd

    SHA1

    84774f80ad3c5915a5be8d057f5fe59b41afd066

    SHA256

    e28b87dd458a3d257afc0c14c00901f58f75e5cafcd54a79afc1e2ffada81429

    SHA512

    c4cef7ad5b6feff860f766187438d20e40bb2b2785f1cd44485061efbea4438d445702746dd47e549aa0ac38e6985d5da294162ca0322bfe055d6541e5bb0329

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{a3eb0b7d-8046-4816-a7d7-b182a6f9dc20}\jYXZj4CSWB71nvWfpRFCphii6PpUu25MKMLidkmSXOC.exe
    Filesize

    1.2MB

    MD5

    7c8a4878659cece907ea7b07a421f25a

    SHA1

    0dc91c3b1173417a129e474817165ca82da429d2

    SHA256

    7b1bd37282944b62703181406e21d21766b6c42eed8d24ce127cf69cd76fa45b

    SHA512

    9644c8089af658ca1ad093547082adc046f2182ba7cd0c564f12c7651ccbcf6eb08784b20915a9c11655e9ddaa89a1847db7bdde79f56116a01fdff41a02647b

  • memory/956-134-0x0000000000000000-mapping.dmp
  • memory/956-142-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/956-146-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4296-132-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4296-133-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB