Analysis

  • max time kernel
    337s
  • max time network
    391s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 01:55

General

  • Target

    ad7bfb3f339de707e3f662a8576355ce391d918ed4e60d583c7b997d275b5bd7.exe

  • Size

    632KB

  • MD5

    473977aa3e833ff144d67ed3e3376e38

  • SHA1

    cc25b7444fc58545cf34365c9fff2129bc7e38a2

  • SHA256

    ad7bfb3f339de707e3f662a8576355ce391d918ed4e60d583c7b997d275b5bd7

  • SHA512

    a0e21caec32488beaaf6848ad50d6089ffa048938586879a1eac9a95aedae538b94e1ff8e65a03974a5d0a979b24edf16734923d540c83e6ce3ef2a44c66bae3

  • SSDEEP

    12288:yvr/LJyiG4GCo7AhzNFQDXZXZxoIuLRw27AhsNHxDXZGc+ivNfKX8kL:yT/LJyiG4GCocHUZ/oIuLJcspZ3NfnkL

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7bfb3f339de707e3f662a8576355ce391d918ed4e60d583c7b997d275b5bd7.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7bfb3f339de707e3f662a8576355ce391d918ed4e60d583c7b997d275b5bd7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha509\ie\MediaViewV1alpha509.dll" /s
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2636

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha509\ie\MediaViewV1alpha509.dll
    Filesize

    85KB

    MD5

    2db4a3e284898f4163363b3df6126217

    SHA1

    055bd8f05d2d3f3fecbfdfb2556eb4b91af863b1

    SHA256

    8b211109023aaf75bf8ec868ee9a4fcaf1249d146e1886349e25afd4cb078565

    SHA512

    4dc3a1553acfe262a898fd814ab49d49451e7ca893007bfa323f354a5abc474fe0834139fafbc5545fe9b7633d4f7688731c13afb2cda34478b1f85484bf7273

  • C:\Program Files (x86)\MediaViewV1\MediaViewV1alpha509\ie\MediaViewV1alpha509.dll
    Filesize

    85KB

    MD5

    2db4a3e284898f4163363b3df6126217

    SHA1

    055bd8f05d2d3f3fecbfdfb2556eb4b91af863b1

    SHA256

    8b211109023aaf75bf8ec868ee9a4fcaf1249d146e1886349e25afd4cb078565

    SHA512

    4dc3a1553acfe262a898fd814ab49d49451e7ca893007bfa323f354a5abc474fe0834139fafbc5545fe9b7633d4f7688731c13afb2cda34478b1f85484bf7273

  • C:\Users\Admin\AppData\Local\Temp\nsk67A5.tmp\aminsis.dll
    Filesize

    559KB

    MD5

    75fccc3ffe4fdeaa26b9098975ba3772

    SHA1

    9f04339adecad084b9696f757a8c12d3fd036be0

    SHA256

    71fd0603ba5bb405a0d134595c0d7f7d2ffd83bf1d083d4ccb6e7382f5bef81e

    SHA512

    bd3c65aa43b88dd3e1449180944d7dd6df3734fb1097117be4285b8b4bd72e7decf5e3e18e8a49b51b71b47b9ae9e444128dfeb1167a4b04a08dc220d314e3bd

  • memory/2636-133-0x0000000000000000-mapping.dmp