Analysis

  • max time kernel
    45s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:46

Errors

Reason
Machine shutdown

General

  • Target

    d1127d4565a85dfe40d38b1c4dabd0890b8c3aa08633ccd5e3804983b8a666df.exe

  • Size

    1.6MB

  • MD5

    36f3fda0230ca7a65772c26a6f256350

  • SHA1

    77ae24ac1114cb28424ccfbc7b5744577a9d6dbe

  • SHA256

    d1127d4565a85dfe40d38b1c4dabd0890b8c3aa08633ccd5e3804983b8a666df

  • SHA512

    47563b9bd36bbc0522abbfc549e6b4b98b8e973bb909118724ea8fb0212ab0691657a7975b3702f16847affcd9f50140d676c0e08ec63e1bf19d9a31f5865142

  • SSDEEP

    3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies data under HKEY_USERS 37 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1127d4565a85dfe40d38b1c4dabd0890b8c3aa08633ccd5e3804983b8a666df.exe
    "C:\Users\Admin\AppData\Local\Temp\d1127d4565a85dfe40d38b1c4dabd0890b8c3aa08633ccd5e3804983b8a666df.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:304
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1980
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x1ac
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:940
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1320
      • C:\Windows\system32\gpscript.exe
        gpscript.exe /Shutdown
        1⤵
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd
          "C:\Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd" 1
          2⤵
          • Executes dropped EXE
          • Sets file execution options in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd
        Filesize

        1.8MB

        MD5

        041f15c4a9f4f305ac4f271fcf5e01e5

        SHA1

        5e5cae02efbe8f788d8c4aa6c7d6503d06c5c81d

        SHA256

        e77dbb77df0452143626026a632fe55c93c6ad28959d574e6a10b05392bd2753

        SHA512

        a39d84e0a8b38dbeb7ffdaa155d5f37c3915958bbf47eefad60b0bfbcd38bee2391d60ffebd812cced0e867cd990be310413ef1dab4ecffd24c81afdace011fd

      • C:\Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd
        Filesize

        1.8MB

        MD5

        041f15c4a9f4f305ac4f271fcf5e01e5

        SHA1

        5e5cae02efbe8f788d8c4aa6c7d6503d06c5c81d

        SHA256

        e77dbb77df0452143626026a632fe55c93c6ad28959d574e6a10b05392bd2753

        SHA512

        a39d84e0a8b38dbeb7ffdaa155d5f37c3915958bbf47eefad60b0bfbcd38bee2391d60ffebd812cced0e867cd990be310413ef1dab4ecffd24c81afdace011fd

      • \Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd
        Filesize

        1.8MB

        MD5

        041f15c4a9f4f305ac4f271fcf5e01e5

        SHA1

        5e5cae02efbe8f788d8c4aa6c7d6503d06c5c81d

        SHA256

        e77dbb77df0452143626026a632fe55c93c6ad28959d574e6a10b05392bd2753

        SHA512

        a39d84e0a8b38dbeb7ffdaa155d5f37c3915958bbf47eefad60b0bfbcd38bee2391d60ffebd812cced0e867cd990be310413ef1dab4ecffd24c81afdace011fd

      • \Users\Admin\AppData\LocalLow\Sun\Java\52aCldgXEUEu9OvLEycOLNHYQPogxgOg0FM8Cb.cmd
        Filesize

        1.8MB

        MD5

        041f15c4a9f4f305ac4f271fcf5e01e5

        SHA1

        5e5cae02efbe8f788d8c4aa6c7d6503d06c5c81d

        SHA256

        e77dbb77df0452143626026a632fe55c93c6ad28959d574e6a10b05392bd2753

        SHA512

        a39d84e0a8b38dbeb7ffdaa155d5f37c3915958bbf47eefad60b0bfbcd38bee2391d60ffebd812cced0e867cd990be310413ef1dab4ecffd24c81afdace011fd

      • memory/304-54-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/304-55-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/304-57-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1192-63-0x0000000000000000-mapping.dmp
      • memory/1192-66-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/1760-65-0x0000000000FD0000-0x0000000000FFD000-memory.dmp
        Filesize

        180KB

      • memory/1980-56-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmp
        Filesize

        8KB