Analysis
-
max time kernel
91s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 17:24
Static task
static1
Behavioral task
behavioral1
Sample
aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe
Resource
win10v2004-20221111-en
General
-
Target
aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe
-
Size
2.5MB
-
MD5
49c7ce0a3bf142d0e344cb77b32c487a
-
SHA1
1e91b3cb90bd645c3f82d13f22ea106944733b21
-
SHA256
aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7
-
SHA512
57c11fbbff2b4317c4cad841980faa03b70579267c541fab0dab55075af12cbd5c6180413884dd1749781c5c8d32b41afb5fc9da6b3f0418edc8b1ed0f27b9ce
-
SSDEEP
49152:hs9C1KHacFQ5t4iuxsFEKJ0KDcefn177F6tqfHFA731m71:FgfoOrsmKJbDcef17R6IPFQ34
Malware Config
Signatures
-
Loads dropped DLL 20 IoCs
pid Process 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 688 wmic.exe Token: SeSecurityPrivilege 688 wmic.exe Token: SeTakeOwnershipPrivilege 688 wmic.exe Token: SeLoadDriverPrivilege 688 wmic.exe Token: SeSystemProfilePrivilege 688 wmic.exe Token: SeSystemtimePrivilege 688 wmic.exe Token: SeProfSingleProcessPrivilege 688 wmic.exe Token: SeIncBasePriorityPrivilege 688 wmic.exe Token: SeCreatePagefilePrivilege 688 wmic.exe Token: SeBackupPrivilege 688 wmic.exe Token: SeRestorePrivilege 688 wmic.exe Token: SeShutdownPrivilege 688 wmic.exe Token: SeDebugPrivilege 688 wmic.exe Token: SeSystemEnvironmentPrivilege 688 wmic.exe Token: SeRemoteShutdownPrivilege 688 wmic.exe Token: SeUndockPrivilege 688 wmic.exe Token: SeManageVolumePrivilege 688 wmic.exe Token: 33 688 wmic.exe Token: 34 688 wmic.exe Token: 35 688 wmic.exe Token: SeIncreaseQuotaPrivilege 688 wmic.exe Token: SeSecurityPrivilege 688 wmic.exe Token: SeTakeOwnershipPrivilege 688 wmic.exe Token: SeLoadDriverPrivilege 688 wmic.exe Token: SeSystemProfilePrivilege 688 wmic.exe Token: SeSystemtimePrivilege 688 wmic.exe Token: SeProfSingleProcessPrivilege 688 wmic.exe Token: SeIncBasePriorityPrivilege 688 wmic.exe Token: SeCreatePagefilePrivilege 688 wmic.exe Token: SeBackupPrivilege 688 wmic.exe Token: SeRestorePrivilege 688 wmic.exe Token: SeShutdownPrivilege 688 wmic.exe Token: SeDebugPrivilege 688 wmic.exe Token: SeSystemEnvironmentPrivilege 688 wmic.exe Token: SeRemoteShutdownPrivilege 688 wmic.exe Token: SeUndockPrivilege 688 wmic.exe Token: SeManageVolumePrivilege 688 wmic.exe Token: 33 688 wmic.exe Token: 34 688 wmic.exe Token: 35 688 wmic.exe Token: SeIncreaseQuotaPrivilege 1552 wmic.exe Token: SeSecurityPrivilege 1552 wmic.exe Token: SeTakeOwnershipPrivilege 1552 wmic.exe Token: SeLoadDriverPrivilege 1552 wmic.exe Token: SeSystemProfilePrivilege 1552 wmic.exe Token: SeSystemtimePrivilege 1552 wmic.exe Token: SeProfSingleProcessPrivilege 1552 wmic.exe Token: SeIncBasePriorityPrivilege 1552 wmic.exe Token: SeCreatePagefilePrivilege 1552 wmic.exe Token: SeBackupPrivilege 1552 wmic.exe Token: SeRestorePrivilege 1552 wmic.exe Token: SeShutdownPrivilege 1552 wmic.exe Token: SeDebugPrivilege 1552 wmic.exe Token: SeSystemEnvironmentPrivilege 1552 wmic.exe Token: SeRemoteShutdownPrivilege 1552 wmic.exe Token: SeUndockPrivilege 1552 wmic.exe Token: SeManageVolumePrivilege 1552 wmic.exe Token: 33 1552 wmic.exe Token: 34 1552 wmic.exe Token: 35 1552 wmic.exe Token: SeIncreaseQuotaPrivilege 1552 wmic.exe Token: SeSecurityPrivilege 1552 wmic.exe Token: SeTakeOwnershipPrivilege 1552 wmic.exe Token: SeLoadDriverPrivilege 1552 wmic.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 688 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 30 PID 1200 wrote to memory of 688 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 30 PID 1200 wrote to memory of 688 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 30 PID 1200 wrote to memory of 688 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 30 PID 1200 wrote to memory of 1552 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 32 PID 1200 wrote to memory of 1552 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 32 PID 1200 wrote to memory of 1552 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 32 PID 1200 wrote to memory of 1552 1200 aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe"C:\Users\Admin\AppData\Local\Temp\aff0d2e40ce9a66a7e8081230aaaf324f0cd34052dfc5ceae9724530a0a887b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic useraccount get name,sid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic useraccount get name,sid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5904beebec2790ee2ca0c90fc448ac7e0
SHA140fabf1eb0a3b7168351c4514c5288216cb1566d
SHA256f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222
SHA5128bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa
-
Filesize
114KB
MD5a3ed6f7ea493b9644125d494fbf9a1e6
SHA1ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8
SHA256ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08
SHA5127099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
20KB
MD54c01fdfd2b57b32046b3b3635a4f4df8
SHA1e0af8e418cbe2b2783b5de93279a3b5dcb73490e
SHA256b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014
SHA512cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2
-
Filesize
8KB
MD597960d7a18662dac9cd80a8c5e3c794b
SHA14c28449cefa9af46bb7a63e9b9ea66a2de0ea287
SHA256e0d1dc6e4c5cc13fb2db08fc741da0d08b315ebc8d3b53baa61552625d19b9c3
SHA5121baab7b5378f3a396b31bf63b01b7905759c9f1d17d71882af63338d64eceda1884c947d93e4d9ef911bded1ef061043c873a88b8272f1aa296731aa745e756c
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
42KB
MD545ec409b03b22ebbbaebf77c96301699
SHA1a6eaf9cdd8f8f93311f497ab8b6f18bedb62a860
SHA25609aaf4758f8e45ab371b633ecfa52685c76ed982e58b6ddb02a29b3e14949895
SHA512b9e9968efdd91a7518d09e0a79713cafda456c6c16011c94bf9bb32fa220f1891d730133e3740cfeb150f896b408e10aa6eef36384776c938584abee9ce2a58e