Analysis

  • max time kernel
    149s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 20:08

General

  • Target

    4809959113a70d4152d48d1d7343d6e15d7bc59159ebc04a011ad717d91ee090.exe

  • Size

    220KB

  • MD5

    fe3f51f278e133a000f4ddafab5b8792

  • SHA1

    7bea10889608837138ab4c4ec75762ec9b4e1d9b

  • SHA256

    4809959113a70d4152d48d1d7343d6e15d7bc59159ebc04a011ad717d91ee090

  • SHA512

    b0746cdc74ace21f14520cbcb7dc0e9f72861ecbd5803f0437218b4b9ee7c6af441eaacdd896c071fc445d9aa9572a1cb15774a65843c6419cc5dfa3d97e3bcc

  • SSDEEP

    3072:/kDeEQNzxUbDf4tmSqtarA9K6pQ32afgWDoqt531Tg:8DtQBxAbSdrt6S32Mxt5l

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4809959113a70d4152d48d1d7343d6e15d7bc59159ebc04a011ad717d91ee090.exe
    "C:\Users\Admin\AppData\Local\Temp\4809959113a70d4152d48d1d7343d6e15d7bc59159ebc04a011ad717d91ee090.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\winNetSc.exe
      "C:\Windows\system32\winNetSc.exe"
      2⤵
      • Executes dropped EXE
      PID:1480
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\kill32.bat" "
      2⤵
        PID:636

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\winNetSc.exe

            Filesize

            24KB

            MD5

            b50a0d854eb7fbc12458ca2e0dbefd01

            SHA1

            3b965ad53d31e30657890dc1d0c738c5473e419d

            SHA256

            20b7a0a2b759086e5d2ab3c0f10773fdcf6c134e0437868a29c2e9d84cf4c9b2

            SHA512

            c527ecef50c0e67284265a279d52f9d3dd3044e398774e9c7b60db3e75b14db7f3bff1d3e5967d24964b27a571f116bdf9fa28a7525fb63ff1762b41348cfa55

          • C:\kill32.bat

            Filesize

            101B

            MD5

            97191ce34ba085d0ec535a183e9a640b

            SHA1

            f0246544231a1817a83bb2b48d908f6bf4830d33

            SHA256

            485360a4807183ccfe9da881f46164ee591c7a521c6615057e7164f92fdccc92

            SHA512

            8d8cf94700cf77141d66a0cb138544f212609b0613c6015f695e2dc438eda43c44aaff9620d8e75d77fb89a0a8a66f45c67dcac922f5a902296151f67376d050

          • \Windows\SysWOW64\winNetSc.exe

            Filesize

            24KB

            MD5

            b50a0d854eb7fbc12458ca2e0dbefd01

            SHA1

            3b965ad53d31e30657890dc1d0c738c5473e419d

            SHA256

            20b7a0a2b759086e5d2ab3c0f10773fdcf6c134e0437868a29c2e9d84cf4c9b2

            SHA512

            c527ecef50c0e67284265a279d52f9d3dd3044e398774e9c7b60db3e75b14db7f3bff1d3e5967d24964b27a571f116bdf9fa28a7525fb63ff1762b41348cfa55

          • \Windows\SysWOW64\winNetSc.exe

            Filesize

            24KB

            MD5

            b50a0d854eb7fbc12458ca2e0dbefd01

            SHA1

            3b965ad53d31e30657890dc1d0c738c5473e419d

            SHA256

            20b7a0a2b759086e5d2ab3c0f10773fdcf6c134e0437868a29c2e9d84cf4c9b2

            SHA512

            c527ecef50c0e67284265a279d52f9d3dd3044e398774e9c7b60db3e75b14db7f3bff1d3e5967d24964b27a571f116bdf9fa28a7525fb63ff1762b41348cfa55

          • memory/1708-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

            Filesize

            8KB