Analysis
-
max time kernel
115s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe
Resource
win7-20220901-en
General
-
Target
0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe
-
Size
284KB
-
MD5
c2bd525141a4bb98e2fde2bec71ae1e6
-
SHA1
817ea48b1c5c06c2694e758fe51aa0ea85b2f3a8
-
SHA256
0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542
-
SHA512
be4b0e18ec8e75e04001856f1e5d59b72d2103306c478c920890807bd4adffe0b00164c1eae4e5bd40190b094520cc65cf0dd9a68c0c1ef7ea1238aa862e7752
-
SSDEEP
6144:tlDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:tlDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 sethome3580.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\system\sethome3580.exe 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe File opened for modification \??\c:\windows\system\sethome3580.exe 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 1960 sethome3580.exe 1960 sethome3580.exe 1960 sethome3580.exe 1960 sethome3580.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1960 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 31 PID 2012 wrote to memory of 1960 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 31 PID 2012 wrote to memory of 1960 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 31 PID 2012 wrote to memory of 1960 2012 0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe"C:\Users\Admin\AppData\Local\Temp\0d6d0a9358b7ac205f2a65b4193450200b5e90ac44bf1300a0148909daff0542.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\windows\system\sethome3580.exec:\windows\system\sethome3580.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD52e1db7fe67c8cdc0c095f8b0489cc638
SHA1a0d9662542406f0e680a27f6da11309406bfe63f
SHA256c11d11e8d93b43aa50bef32fe0d43d0bd1752ace22b10fe0ada6d025846265cd
SHA512cedb594a75979e9d088a514b3e9551054aa692c5f3ea8d9e953c92b3c2b2d8b137fa07bfc09e8d468f6381bb405f830b01d31191b7f163bef2bd0caba62a1600
-
Filesize
284KB
MD52e1db7fe67c8cdc0c095f8b0489cc638
SHA1a0d9662542406f0e680a27f6da11309406bfe63f
SHA256c11d11e8d93b43aa50bef32fe0d43d0bd1752ace22b10fe0ada6d025846265cd
SHA512cedb594a75979e9d088a514b3e9551054aa692c5f3ea8d9e953c92b3c2b2d8b137fa07bfc09e8d468f6381bb405f830b01d31191b7f163bef2bd0caba62a1600
-
Filesize
284KB
MD52e1db7fe67c8cdc0c095f8b0489cc638
SHA1a0d9662542406f0e680a27f6da11309406bfe63f
SHA256c11d11e8d93b43aa50bef32fe0d43d0bd1752ace22b10fe0ada6d025846265cd
SHA512cedb594a75979e9d088a514b3e9551054aa692c5f3ea8d9e953c92b3c2b2d8b137fa07bfc09e8d468f6381bb405f830b01d31191b7f163bef2bd0caba62a1600