Analysis

  • max time kernel
    178s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:30

General

  • Target

    ed80f23ce087e4141e31f7cc278932effeda192da2afa076ee03de28ffa058f2.exe

  • Size

    625KB

  • MD5

    75758ea1bddf91e249edf6387adbd794

  • SHA1

    06c1256c9d5f8305a8b34580a4963b4fdf86377c

  • SHA256

    ed80f23ce087e4141e31f7cc278932effeda192da2afa076ee03de28ffa058f2

  • SHA512

    f53a9f02a46c73fb3d775e8fb73ae135097849e95448100cd87fbfeda91a4f8409231f8ee096512eedf3a6e49ed212b1a29eb493cd487b508fc20ff6d7acce1e

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed80f23ce087e4141e31f7cc278932effeda192da2afa076ee03de28ffa058f2.exe
    "C:\Users\Admin\AppData\Local\Temp\ed80f23ce087e4141e31f7cc278932effeda192da2afa076ee03de28ffa058f2.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4852
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ed855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2632
  • C:\Windows\system32\gpscript.exe
    gpscript.exe /Shutdown
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Microsoft\input\fr-FR\pK9Rw5RkZXcU7vKHmVjoCw.cmd
      "C:\Users\Admin\AppData\Local\Microsoft\input\fr-FR\pK9Rw5RkZXcU7vKHmVjoCw.cmd" 1
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Sets file execution options in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:3428

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Power Efficiency Diagnostics\15Eo8SC0QJ7CiocKweYvTLjp3XE5wCCFBZxaVL7sUWbuXHd0BrQaTOb7p.exe
    Filesize

    1.1MB

    MD5

    96405a28c9c30c72de48f11ff6dc1537

    SHA1

    55e8a80ae5e67da75aee8782d7c20cd467db6ab2

    SHA256

    b85eb6c28047375003dd34c06496f57ffb184396cd987d168a306204dea8ba05

    SHA512

    ae555e28c51d4a9f7780a85b22592372a35e5e0b038fb436cbda6f9e2c7b68a38d00d1b072d92f358eeba433e2ac5b0407b04f33b2896701b31c9f61e2752ee7

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\wNTwT3QqJ4Y6E9IqLmGkkXcWMsKCX0u7ijqGfdE.exe
    Filesize

    1.1MB

    MD5

    eaf93017908968d92ddf4d3c1b63fa5c

    SHA1

    5045a0dec63c77b601262d80fa73ef263a3944ee

    SHA256

    fd96644f89140a0ebf3d0060e6ef01476fd5d0f2274af17c9258a8cfdf3f3c86

    SHA512

    2fcb1b78b2f3db5158c97a1e0701f007119691d0524e996fdb7e1232562fa0e82ccc8597daf8db2fc9c63f6347db3bb425b0da41f381afb85f785cc41f8752d5

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\kk\Izz3owLtlLGZSY61ZhxLlUoV1YbEQ4WBY3KkzolG771iNDvZviEtSPKpgVcJ4LnJ5KBV.exe
    Filesize

    736KB

    MD5

    1f5e46906d7ba300b6dc318392879cd1

    SHA1

    f8ff04d59198233cc0f70125ed66a95da48f04c7

    SHA256

    1f7eef7ecc18a9847bcfe555fa569b016d11f1c8df775dcdd8a07a9c519d3884

    SHA512

    5a14a5c0b4dd7c69fe3bf42b5900dd531ba973499bea2a87bb03829da9d9017564cb2597028e4efe1a7635d6cebffe08d655a21aa6422a6b6c609afaa3f3d9b4

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\tn-ZA\qU2aTfZOexDywY077DwuF4d7JLFqLs078JBAe4lv70rianT3Ocsx.exe
    Filesize

    778KB

    MD5

    8307e6e04db2b1c19f5cdb68d4a26f93

    SHA1

    5a8d9e901ead392a3858ec9b84af330128d5b3d4

    SHA256

    d7f0aab599ee5b6caf3d3e7e5cdab2247c2ebdd9fcbfe1ae37c795eb0da5a776

    SHA512

    42b9afe41fde346f1218c24ccd2e9757e7f04f30e9edf2332c1adc0f2f2c811b0bbe4e5001eb4336fe53cf39a4cd75106243781ad49f6510b9b2b8a03d5c9b42

  • C:\Users\Admin\AppData\Local\Microsoft\input\es-419\8t2JJzMBwgbbZZ352lYZECqKrxhiThZHmFjP8Uqe6tWAgqTajqBZcXpAaOLYotN51.exe
    Filesize

    732KB

    MD5

    67a468bc5a274067bf99af5b481dcce7

    SHA1

    088fd7569406baea50324eff37373d58430b081a

    SHA256

    9893397326567fe5a8ae94a57b90bff80215713a0d773c085db6f3713aec8d90

    SHA512

    b0d1eaf8a417391b2b1ec4e328a0635dea6e849f8701b017990fa027376b3d5673d80a92382be7e154a229f0b027c48fa37c159c48e10c2ee55c57661f9fada4

  • C:\Users\Admin\AppData\Local\Microsoft\input\fr-FR\pK9Rw5RkZXcU7vKHmVjoCw.cmd
    Filesize

    635KB

    MD5

    299d337f1255db838026e908f881032e

    SHA1

    9fa3df3ff1bab6b132157a2035f4a073f61f373f

    SHA256

    e36252404e82ed2c8931c8d9cee92a25663c4a2294c0d4fbe78006b742312e33

    SHA512

    5c28b282c5107ea4556635cecb5ae5ccb00adabe6a3a9ad69afc16371ece41700577475b2287aed366110534231b7c8ffb139126b5c676315cb08023a5c642c2

  • C:\Users\Admin\AppData\Local\Microsoft\input\fr-FR\pK9Rw5RkZXcU7vKHmVjoCw.cmd
    Filesize

    635KB

    MD5

    299d337f1255db838026e908f881032e

    SHA1

    9fa3df3ff1bab6b132157a2035f4a073f61f373f

    SHA256

    e36252404e82ed2c8931c8d9cee92a25663c4a2294c0d4fbe78006b742312e33

    SHA512

    5c28b282c5107ea4556635cecb5ae5ccb00adabe6a3a9ad69afc16371ece41700577475b2287aed366110534231b7c8ffb139126b5c676315cb08023a5c642c2

  • C:\Users\Admin\AppData\Local\Microsoft\input\sr-Cyrl-ME\VdbqSW9gIU7fSAuqbVStkRNjEv8ZsQaPsFRxYK0i49SwhjNdsOWdBbgVrFGFtax6NE2wlvA.exe
    Filesize

    837KB

    MD5

    d863091c27556d1e5eb7db68239dbc56

    SHA1

    f6392d99ff72ff8a06fa5f5735425a16758175eb

    SHA256

    5831f834506bd0f5e87c5680f5152ed7b60654d20ff204d6d9f0ac17f4e4e5b6

    SHA512

    9917e7a3dda2f4f9698501f340f38550591897d4e1d1b1920b2a0b2c8bda3403c046515eba5063ecac00eb93588116d6c629b67d9cbfb341ca6afe1008aa4a55

  • C:\Users\Admin\AppData\Local\Packages\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\Settings\CaH0DD3Pz3sxH3AcHevFdyoTjbi4g0cGfzhXOei6y.exe
    Filesize

    800KB

    MD5

    cb43300f9ea4cb208f87caa2e49795b8

    SHA1

    2ab781fe5d3e56b96378ac69b88ccaf0bc3ff05d

    SHA256

    ab007a4dff91061261afb42ce9a77d1348b421115bf663ea52b1a68511e6c6ed

    SHA512

    26d85035e9c5c990442ba30d7672eb63f48e233d84f72e6243bd5a10d1efc6241aeae575dc6fabf5b3aab8a16bfbe69df2f558eb6c883aca13a4f47fa87175e5

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\LocalCache\lfQ8ciOgeJ4E6qnMkznhUEWV0Kd8viGOgdrclSnMTblAyRxgM.exe
    Filesize

    1.2MB

    MD5

    68af0baff8d86be6c4ea0a5affb7fa0a

    SHA1

    942e3dfd806d6bc5afe9fa0d7486ce464eeea9f2

    SHA256

    c71ab2f5443224c45e9dae6704e4490ef0d1ab040dcf81491d3f2272f9e096ac

    SHA512

    e739ee30076172974e21660413a72cb5fe226f23ceaa5eb1a26fec6f866163a477ef28560700e10fe409e5671195588d8d49af96f559885b49a4d0c148e40c77

  • memory/3428-134-0x0000000000000000-mapping.dmp
  • memory/3428-141-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/3428-146-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4852-132-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4852-133-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB