Analysis

  • max time kernel
    88s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:37

Errors

Reason
Machine shutdown

General

  • Target

    42d2c24e492154147631ad8360d730bc01bfb8e1f057563b5ba96fac199c438f.exe

  • Size

    394KB

  • MD5

    0c985eba4c824c943dfd05035bc4eef1

  • SHA1

    f5ba7a99bc283a5cc527c9e978986e7efad1b4f0

  • SHA256

    42d2c24e492154147631ad8360d730bc01bfb8e1f057563b5ba96fac199c438f

  • SHA512

    3b69bbcd67456cfb326e432016d7c292746cb8ef5897ab2bb3322452b7424189713d944ee3f768cb8c320db805c6de1c634e980549c806d41724e02e07b43bd9

  • SSDEEP

    3072:dSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbMtJyVdyw:ssqhJMxzJiU5SeLmNSbMtJU5

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds policy Run key to start application 2 TTPs 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    1⤵
      PID:584
      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
        "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd" 2
        2⤵
        • Executes dropped EXE
        • Sets file execution options in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
    • C:\Users\Admin\AppData\Local\Temp\42d2c24e492154147631ad8360d730bc01bfb8e1f057563b5ba96fac199c438f.exe
      "C:\Users\Admin\AppData\Local\Temp\42d2c24e492154147631ad8360d730bc01bfb8e1f057563b5ba96fac199c438f.exe"
      1⤵
      • Adds policy Run key to start application
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:548
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:612
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x47c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1284
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1604
        • C:\Windows\system32\gpscript.exe
          gpscript.exe /Shutdown
          1⤵
          • Loads dropped DLL
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
            "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd" 1
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Adds policy Run key to start application
            • Executes dropped EXE
            • Sets file execution options in registry
            • Drops startup file
            • Loads dropped DLL
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\fr-FR\t4dFI9RQTwUjSgHmaEe3Qel.exe
          Filesize

          579KB

          MD5

          1a9c797d29682fee63193eb567a1aa3d

          SHA1

          f0fdd11f2c3512d4603903475e883a3a35c43992

          SHA256

          d3309fa0b459f840ced7636481dc71b80ceff1f6bee087ae0e3e85ca7486a940

          SHA512

          43ffe3ba837613195cdf66421a26c0fbaad2f21a755559505fb5b493b85365d95e5cafcb95b0946d46ddde7707cf07a12607bdf61c1a56f2e1b7b84e742e21a2

        • C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\EgE22Vyo0sGy6bwRThu2Ym2hmGkB6w0iJlHhrAbAGj.exe
          Filesize

          621KB

          MD5

          065fd1ebb7963f6a053d8a8473a2c848

          SHA1

          ce25487153d8e3003089f3b89fb1b5b57744c9c1

          SHA256

          691e47b3328d1128bed6c88dd3f361e62f5b92b8557ef108f460d8229fcee9b9

          SHA512

          d13a6eb227f92a5292b91caa98b7e8bfe420ab8aeae5e6979dfed0ccc9ef472a7b54a23707acec3537f9eb6eb3069a75ab58d46e90e3008a941f8238785f9916

        • C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_15ac16619585aa27282df5e4c6acd0916524a313_cab_0768560b\JpGgE1ITlmRnWoTbulikkYbf9fDYsHlsdBdeDSNZBwionDvOFZkdloH12N6fsJH.exe
          Filesize

          480KB

          MD5

          dbd057ec1dd76e29ae90d05fea26add2

          SHA1

          4307fb9b6ac71e66a4068714928d4d729db1ca6e

          SHA256

          bde03ca134e87d4825c77afd9bfc282210bfc96b01609bf857c039f7a6804cf0

          SHA512

          4f28769ecb48b4d7ee0f30b50bcceb924477b6036373e3e51440f8896eba47117116bcc28bf64389889ed783f1b23fb30696280171f3e24d44868cf61c25b625

        • C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\vcRuntimeMinimum_x86\FIutG5cb4xaRoBaX9Cvff4XI8Pyea.exe
          Filesize

          445KB

          MD5

          bd0ada4f329daf033cd19e7f3cfe0b42

          SHA1

          6ac7acea9d8146d21dfac453bc0a90b754f986d0

          SHA256

          8c586b3e87d993c684ea205ca3f8c04e37243d9f7b2480492ac0694261224b75

          SHA512

          8473e9f1fe369fe48b717d358aad5a4b23ba2090241e06c2b3447b18e4eb48cc5505ab777cf225fb99441585bbbae3ab07412ac5dd7c86c356c89620362fcf06

        • C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\mPJkUeYYYkiJUp9MWU1pwM2C0K36RBr1VpS48tDK5puS.bat
          Filesize

          801KB

          MD5

          eada267b2b9cba7167ff096c48819a88

          SHA1

          9f5e7bd7b91da8b10bc13ddbd7096fdcb7fbcd6c

          SHA256

          a9489626d121feba6da66068e70686ac2395460b3a3d0d53f3e00565c16bcac8

          SHA512

          bc7e3abacaf5050eba84653f93e6a3ea77c9ddc3f5f624b3e7922a94f29936cfbb227fd2d5cbfd4e5ee1e4cfb0f642e51dd2db46ea79c76f42743101c39b2d19

        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\cElrcVceAIaUqCGcOdzv6a7FHKhz9g5PVPdVX7PbO.exe
          Filesize

          408KB

          MD5

          92d2e59b29debd8cb2bfd33ef0eac6e0

          SHA1

          fdc3806fcb32328051cdd3432c0c3683b0e4e6d3

          SHA256

          b951b40f28345ca3927e730eb4ee959474bc752f4dad6efdc2615006e35a368e

          SHA512

          641b31b51b832a92e5e427017ffc4240e9a5d8035706016918dd2c11f1cda53ee1d9491670d0b1b2631eeded0e143dd0592dd40fc7a7e717e4f65171cdb0c700

        • C:\Users\Admin\AppData\Local\Microsoft\Office\JC7zvEjlYZNbhz1GOH5FagZYu8jON3wGZlPwdY3SryABZ9TCyy.exe
          Filesize

          1.2MB

          MD5

          cfe3630db95d9fc7a1f3a965711442a5

          SHA1

          6b3732f6225a2938d7961d417afd2d585e9bd3dc

          SHA256

          7d15fc8fd6a49f1b6810b7bbcf7e62cd3c00273e2765fcaca14a8442f977f040

          SHA512

          d06e3fcc4b75669fb9609bf43244f3ca5a94c44e05377641fe8de13491ddc95a8820c902f8c7b38d9399f5527d7eec100c764799bb940e3e16435d838f6951af

        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\7DE3E2MWNa8pUCxDU193PzPeLAB.exe
          Filesize

          471KB

          MD5

          dcd4ddeb5aa30f9f98913cb4bfca7a0a

          SHA1

          d5dc6ec503c56eff61edd8aa7d78f3be725641a0

          SHA256

          41c09329c0ee8e13f1cdb3b6987666f304eb103eb5ea6e3cb4ad252fe0f3973f

          SHA512

          bacc7344304fc7500818b56b0af9fc154c4edb2cfe13008e608ffc751dd02443bc7ad0928b4dfeb669baabbd2c8abdabf885617ce7d9ab7050b362bc688d2269

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\datareporting\archived\2022-08\qplPCPcefXjX8Or6uCsm6EVND16eDfrbWDZIPhvdC6Xhow42zyavUNT0Af.exe
          Filesize

          472KB

          MD5

          e4a8d5aa37da0086311fb90ac661e953

          SHA1

          cff2bd9600a8fb1d658749854003ef05038c8ea3

          SHA256

          fece0451e64d54feec1302dd6bfe4f3ab2d3220a65a003f56cca326dba1792f2

          SHA512

          88ff90d5887ad21bdd7c0a1fa41888128f7327b9649356f6e168304531fb6ad510c56c21fd9ac36578067a4ce9389af88c5ae4195765a79199c3b5d4d590dea2

        • C:\Users\Admin\Links\2I39NnRrWizVgsI7wd6LV1ZnklgcORYzWt3RqCl240cTR2EO9hIQMqRPTzsPE7ULXSEo9jt.exe
          Filesize

          565KB

          MD5

          93121a5d14fccfc240ee87092c232ef7

          SHA1

          ddf32bfc347e68390dd710bdc32895fc64e96a52

          SHA256

          28c69a5d89c1d032a322a5591a825d54e8b5457ed44e58ecf3f2e7111c17772e

          SHA512

          d50c4984d185eae2130388d60a6137037ca52f1b5a9883bdecf6dddb2755457478269dcb3c1ef1f939453881abaf5a93d7b2bdbe12c9ead022bf8f0ad84a8f92

        • \Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • \Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • \Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iwv3qbnj.default-release\safebrowsing\KxX8qFRgF41yYFgIRADX3RmgnDc0gwHsje7OQ9J187A8xbeaeDH90QtELv4vxPUufggHTL.cmd
          Filesize

          655KB

          MD5

          477919a24aa08ae9cf46e642c76b12cc

          SHA1

          eb04ff19f547190eedebffb3d9bb83578fd58e37

          SHA256

          1adce6b704df76214c0b1833d42ca75451663ee4a4024607aa9bd1276c2bc5af

          SHA512

          da9a6ed2b3afd5d3c2827b70ab62e50b1bf1c047d2c3a868fcc4b1e53c19e7b29d6b313f8ff33966871281dd323d733dba0524cc0290073cc9afb7644b8fa658

        • memory/548-56-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/548-54-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/612-55-0x000007FEFC281000-0x000007FEFC283000-memory.dmp
          Filesize

          8KB

        • memory/1580-76-0x0000000000C20000-0x0000000000C4D000-memory.dmp
          Filesize

          180KB

        • memory/1580-64-0x0000000000C20000-0x0000000000C4D000-memory.dmp
          Filesize

          180KB

        • memory/1580-65-0x0000000000C20000-0x0000000000C4D000-memory.dmp
          Filesize

          180KB

        • memory/1712-62-0x0000000000000000-mapping.dmp
        • memory/1712-77-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1712-81-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/1712-66-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/2044-79-0x0000000000000000-mapping.dmp
        • memory/2044-84-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/2044-85-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB