Analysis

  • max time kernel
    187s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 21:12

General

  • Target

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640.exe

  • Size

    449KB

  • MD5

    205d5d949e8f30087b6c4627976305a7

  • SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

  • SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

  • SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • SSDEEP

    6144:PwhRhJY9Xmu9OaAA/5gpPVBtNpMGS/l8QJCUN:4LJY9Xm6L5MLpM5/lVTN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640.exe
    "C:\Users\Admin\AppData\Local\Temp\6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640.exe
      "C:\Users\Admin\AppData\Local\Temp\6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe
        "C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe
          "C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 580
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1800
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1648
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"
          4⤵
          • Executes dropped EXE
          PID:840

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KeyDebug.txt
    Filesize

    2KB

    MD5

    a82cea0b5cfc5079f7af5914742d32c0

    SHA1

    b0d7b81ec2b51066760c7f6d316b26c905638e12

    SHA256

    9c10ffee2c9a577cbbccb88f256aa9dc797bc01464a599833c333f5d93c91879

    SHA512

    264328a71424d14d1ba390f2458192f38fed3e249c7b42115d0748d6ddaa667dd01b564bcbca547ad2fa74201df9a495dad859b0453e1ed6933364cb8795a182

  • C:\KeyDebug.txt
    Filesize

    3KB

    MD5

    d6817df272953c1840f5c91c4e50b91b

    SHA1

    36845298bd2f7c4150bc7d36d660c7a2460521f6

    SHA256

    d2128169fd6b4667b4061a5d944113269d9944cc52ddc1510347c436de6f17a4

    SHA512

    615b79656580a1f0dba97f7bbee14d9e730e83a803336a7ae0ed37515d0426942e72ca0e620cefb660e43a2a2526761cdc3ffcba1a3c6543cbec61324156a853

  • C:\KeyDebug.txt
    Filesize

    3KB

    MD5

    263984387ebe4fa0d9866b7192375120

    SHA1

    8154bf1fa5f3cedb400c33d8e3bbe82b8a52de56

    SHA256

    400361ce2b50d0738b0a3c303b2009e686d1c44a3fd31b7466601c30125e8d05

    SHA512

    8f0613480adbf832bf1d57e265a672626605f7ca4bd6e7e59c7e17baf8b0e42bbc2028ebb8e4ee48e7a3a0a5e6855d00c1a615b2ae6efd39e69d470f31d39691

  • C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • C:\Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
    Filesize

    14KB

    MD5

    286a9a6a733340ede2ff87ad38882677

    SHA1

    ec9d40116d3a4600b95fa30476cf58f582d83bec

    SHA256

    1db2efb896cfedc854732eb9a7542e1f8ca784c36027db252bf1bf572548a737

    SHA512

    2db46989857b763bd06636d763cb16aa0ea454ae373844bb1e86e9325e27532f323aa4e235f0aa32d52e1bbc42004bb16e6630a349c2bac4c8a8802873c7e0b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
    Filesize

    14KB

    MD5

    286a9a6a733340ede2ff87ad38882677

    SHA1

    ec9d40116d3a4600b95fa30476cf58f582d83bec

    SHA256

    1db2efb896cfedc854732eb9a7542e1f8ca784c36027db252bf1bf572548a737

    SHA512

    2db46989857b763bd06636d763cb16aa0ea454ae373844bb1e86e9325e27532f323aa4e235f0aa32d52e1bbc42004bb16e6630a349c2bac4c8a8802873c7e0b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
    Filesize

    14KB

    MD5

    286a9a6a733340ede2ff87ad38882677

    SHA1

    ec9d40116d3a4600b95fa30476cf58f582d83bec

    SHA256

    1db2efb896cfedc854732eb9a7542e1f8ca784c36027db252bf1bf572548a737

    SHA512

    2db46989857b763bd06636d763cb16aa0ea454ae373844bb1e86e9325e27532f323aa4e235f0aa32d52e1bbc42004bb16e6630a349c2bac4c8a8802873c7e0b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Directory\VHJHY.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
    Filesize

    14KB

    MD5

    286a9a6a733340ede2ff87ad38882677

    SHA1

    ec9d40116d3a4600b95fa30476cf58f582d83bec

    SHA256

    1db2efb896cfedc854732eb9a7542e1f8ca784c36027db252bf1bf572548a737

    SHA512

    2db46989857b763bd06636d763cb16aa0ea454ae373844bb1e86e9325e27532f323aa4e235f0aa32d52e1bbc42004bb16e6630a349c2bac4c8a8802873c7e0b6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
    Filesize

    14KB

    MD5

    286a9a6a733340ede2ff87ad38882677

    SHA1

    ec9d40116d3a4600b95fa30476cf58f582d83bec

    SHA256

    1db2efb896cfedc854732eb9a7542e1f8ca784c36027db252bf1bf572548a737

    SHA512

    2db46989857b763bd06636d763cb16aa0ea454ae373844bb1e86e9325e27532f323aa4e235f0aa32d52e1bbc42004bb16e6630a349c2bac4c8a8802873c7e0b6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
    Filesize

    449KB

    MD5

    205d5d949e8f30087b6c4627976305a7

    SHA1

    6057323edd66c094604160ffc5c5dda6720084a5

    SHA256

    6a287290942d279952fa0ff4b6cc239e3e4122b24d81105f2207ada9b203b640

    SHA512

    b4510659794d40c7764eab3a0e2c235349e7b2123812d233c21fabe6d42a700a9d9451964b97af9007d3fab33f946ab285e963b3b94b2736a353a24928f76d26

  • memory/320-142-0x0000000000655000-0x0000000000666000-memory.dmp
    Filesize

    68KB

  • memory/320-141-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/320-83-0x0000000000000000-mapping.dmp
  • memory/320-102-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/320-98-0x0000000000655000-0x0000000000666000-memory.dmp
    Filesize

    68KB

  • memory/320-96-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/576-99-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/576-100-0x00000000003C5000-0x00000000003D6000-memory.dmp
    Filesize

    68KB

  • memory/576-103-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/576-92-0x0000000000000000-mapping.dmp
  • memory/840-140-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/840-129-0x00000000004027D0-mapping.dmp
  • memory/1216-159-0x0000000000490000-0x000000000049C000-memory.dmp
    Filesize

    48KB

  • memory/1216-143-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1216-160-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1216-136-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1216-128-0x00000000004027D0-mapping.dmp
  • memory/1376-69-0x00000000004027D0-mapping.dmp
  • memory/1376-66-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-79-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-70-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-63-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-59-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-65-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-74-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-58-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-67-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1376-61-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1428-97-0x00000000020A5000-0x00000000020B6000-memory.dmp
    Filesize

    68KB

  • memory/1428-101-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1428-95-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1428-82-0x0000000000000000-mapping.dmp
  • memory/1492-56-0x0000000000A55000-0x0000000000A66000-memory.dmp
    Filesize

    68KB

  • memory/1492-57-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1492-54-0x0000000075B11000-0x0000000075B13000-memory.dmp
    Filesize

    8KB

  • memory/1492-55-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1492-104-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1492-105-0x0000000000A55000-0x0000000000A66000-memory.dmp
    Filesize

    68KB

  • memory/1648-145-0x0000000000000000-mapping.dmp
  • memory/1648-157-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1648-158-0x0000000000965000-0x0000000000976000-memory.dmp
    Filesize

    68KB

  • memory/1648-161-0x0000000074780000-0x0000000074D2B000-memory.dmp
    Filesize

    5.7MB

  • memory/1800-149-0x0000000000000000-mapping.dmp