Analysis

  • max time kernel
    158s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 18:46

General

  • Target

    e02d02fba74e5709abe49aef7dc280a0b76b620c2a353eb12c17ac0b6adfddb3.exe

  • Size

    727KB

  • MD5

    2d1066adb1afb4c7f18898c4142508b0

  • SHA1

    23c9f15b4209f68909731f9afd0058693165761d

  • SHA256

    e02d02fba74e5709abe49aef7dc280a0b76b620c2a353eb12c17ac0b6adfddb3

  • SHA512

    42b4f1a2ff015f5024df798cbb86b6e19dc73a0bfe4940a4c0bec6fff6dedff0749e01531c6fe9ab68a90f028e5fee6fb2b6cfa25b5b2b2a72bb63d7e2178fad

  • SSDEEP

    12288:4h5PNFY5UOtI/AjPM2HarryoicKVhwat3BqTr//5JJSFqonTVuJNV0Qu:4h51FY5UO6SPM4a/Bi9YaRBqfBonxuJy

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:376
      • C:\Users\Admin\AppData\Local\Temp\e02d02fba74e5709abe49aef7dc280a0b76b620c2a353eb12c17ac0b6adfddb3.exe
        "C:\Users\Admin\AppData\Local\Temp\e02d02fba74e5709abe49aef7dc280a0b76b620c2a353eb12c17ac0b6adfddb3.exe"
        2⤵
        • Sets service image path in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\034235.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4512
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
            4⤵
              PID:4316
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
              4⤵
                PID:1880
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\034241.bat
              3⤵
                PID:4916
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
                  4⤵
                    PID:208
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
                    4⤵
                      PID:2484
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    http://www.so.com
                    3⤵
                      PID:4460
                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.so.com
                        4⤵
                        • Modifies Internet Explorer settings
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SetWindowsHookEx
                        PID:4496
                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17410 /prefetch:2
                          5⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of SetWindowsHookEx
                          PID:3772

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\034235.bat

                  Filesize

                  5KB

                  MD5

                  ad0d80bf6b4292dbada25f7f8fd6556c

                  SHA1

                  40133d1dea9905bf406fb88efcb57cd693e6cf43

                  SHA256

                  081f45a04b555b2406e5b63afbcdba4e564c3157e7d3720d21e8f53d2127bae1

                  SHA512

                  76eaacabecaaed7b4eb53fbc5db4d53b15ccdbe6526119346dc444e932cc1ebfffb74b0df3f54c85168d72082f9017802e9775bc178a58fcac0ab3c1ddb519cb

                • C:\034241.bat

                  Filesize

                  5KB

                  MD5

                  ad0d80bf6b4292dbada25f7f8fd6556c

                  SHA1

                  40133d1dea9905bf406fb88efcb57cd693e6cf43

                  SHA256

                  081f45a04b555b2406e5b63afbcdba4e564c3157e7d3720d21e8f53d2127bae1

                  SHA512

                  76eaacabecaaed7b4eb53fbc5db4d53b15ccdbe6526119346dc444e932cc1ebfffb74b0df3f54c85168d72082f9017802e9775bc178a58fcac0ab3c1ddb519cb

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                  Filesize

                  471B

                  MD5

                  a42abb21be3940a88a73771b18ed0f35

                  SHA1

                  de12f2f619852ef135ee726614c43c2033ec5743

                  SHA256

                  edaf1fb1f6ca2a0caf5f4d85b3f13507bd5df4971fa9ea8a6e08c1227f1ec667

                  SHA512

                  c1f775deb2bcb2e0c48ed74dec1cd95f34690ca16d6465175d52d60ae45e746201cc608a58b6f8f080b7e6a7893993b61093c7d9ff63fa735ebaba61ddd0ebf7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                  Filesize

                  434B

                  MD5

                  42cd2b3af3d3f67bca8ab0a6e9556936

                  SHA1

                  3f28521593a24fdc658ed4297c2edaa495506900

                  SHA256

                  9cebf5da35c40220fc8afc07d62a0b11738bb728520b6467a7f3aa0049e32a38

                  SHA512

                  463bdc8060aa907bceb5bfc4ba66b15a6d6cdaf3f1ce6242d8f27a6a5ec64a645d4c7708120039a134a50cfecf6516d171145579020f8e5b8f439555221f7453

                • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

                  Filesize

                  1KB

                  MD5

                  c97aa13322054756feb4c932d8fdfbe0

                  SHA1

                  1cd768110f0542f1c46cdde6827baaa048781062

                  SHA256

                  c9b82c81193a7a556c9e568d125badc875c17e896a139748c65865c50611569d

                  SHA512

                  4dc037a38e9b385d6f863065d23ec0b567ec0d9a0a7aeb92b840efde382445e35b75988f77d5dd2f7f0d8a97021bc44352beb4bb46d13cb987649e64329c1535

                • C:\Users\Admin\AppData\Local\Temp\8604C2\DsJBrIs.dll

                  Filesize

                  594KB

                  MD5

                  18695a7782be29de3c9fe4cc6b390a0d

                  SHA1

                  f277032f2d04c84e70518b0ce719b061e44fefe6

                  SHA256

                  feb738d33565abee25cf8dbfc50a306b1151dcd9679ecca6c5e515e3e6bab40a

                  SHA512

                  ea55547edc767bc3811c0d82d2eb21334ce88da47f1e004ee3429b41038aac4eaf19f29edbc4d57d8c47d3a0649f2bf09d7b9f05eb4b5b7a452ed992941052cf

                • C:\Users\Admin\AppData\Local\Temp\8604C2\DsJBrIs.dll

                  Filesize

                  594KB

                  MD5

                  18695a7782be29de3c9fe4cc6b390a0d

                  SHA1

                  f277032f2d04c84e70518b0ce719b061e44fefe6

                  SHA256

                  feb738d33565abee25cf8dbfc50a306b1151dcd9679ecca6c5e515e3e6bab40a

                  SHA512

                  ea55547edc767bc3811c0d82d2eb21334ce88da47f1e004ee3429b41038aac4eaf19f29edbc4d57d8c47d3a0649f2bf09d7b9f05eb4b5b7a452ed992941052cf

                • C:\Users\Admin\AppData\Local\Temp\8604C2\rqxCDul.dll

                  Filesize

                  544KB

                  MD5

                  334ffdc672a3bfbd000b83a6ca9e5f68

                  SHA1

                  0950fe09905fa60ee8d93d96e95d71f1c2de18a8

                  SHA256

                  e5b3150a64c1fbc6c9c4021ef0eec7c776a793610bedcd4485c949b67729f9d0

                  SHA512

                  99a22070b8b985c151748fbdf258db98a8dbe1807ce5c89a2657168f86ec5bae4caa3a3963f20ec82e846ca90b05a0ecd4e3e9fe4188a122e9527c5ef8e81998

                • C:\Users\Admin\AppData\Local\Temp\8604C2\rqxCDul.dll

                  Filesize

                  544KB

                  MD5

                  334ffdc672a3bfbd000b83a6ca9e5f68

                  SHA1

                  0950fe09905fa60ee8d93d96e95d71f1c2de18a8

                  SHA256

                  e5b3150a64c1fbc6c9c4021ef0eec7c776a793610bedcd4485c949b67729f9d0

                  SHA512

                  99a22070b8b985c151748fbdf258db98a8dbe1807ce5c89a2657168f86ec5bae4caa3a3963f20ec82e846ca90b05a0ecd4e3e9fe4188a122e9527c5ef8e81998

                • C:\Windows\SysWOW64\JsEpoC.dll

                  Filesize

                  63KB

                  MD5

                  fd8d4e1d20d085593e26e4fb879aac1f

                  SHA1

                  dd233f681bd4807851963736fe4554e152d06793

                  SHA256

                  39c865da0e189d296eae8838d9240aefadfd63507b070fa0e6803910a51202f3

                  SHA512

                  dee6185217cf4b9bfc1fb526ec365de67294f8ddeea95eaa5f72628731b52136cc2fa703a84cf35a22a32b870bbeb1f068192336474880c03c879380e7eac317

                • memory/208-143-0x0000000000000000-mapping.dmp

                • memory/1016-146-0x0000000071FC0000-0x0000000071FE3000-memory.dmp

                  Filesize

                  140KB

                • memory/1880-140-0x0000000000000000-mapping.dmp

                • memory/2484-144-0x0000000000000000-mapping.dmp

                • memory/4316-139-0x0000000000000000-mapping.dmp

                • memory/4512-137-0x0000000000000000-mapping.dmp

                • memory/4916-141-0x0000000000000000-mapping.dmp