Analysis

  • max time kernel
    187s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 05:25

General

  • Target

    d5c9cce6e1cac73a2f39d20105dccd3808d3bb98a9da304a20cf6cb30052b981.exe

  • Size

    460KB

  • MD5

    ad1fbf4bd151e7d15210a1825d5f09e4

  • SHA1

    32f5e56271ad25af3c1ef94df6cf3db010508d8d

  • SHA256

    d5c9cce6e1cac73a2f39d20105dccd3808d3bb98a9da304a20cf6cb30052b981

  • SHA512

    9dca92e995069ab65a4455d861b86d53203ab166a001eaeaa5764fcc0dea4400326bb4efa491f46931868779d0459c635b332d97c5f7642d800d93901b4fe524

  • SSDEEP

    6144:7sGoRJkv01CWcAQShgQeAqkQf9FUzt3VTVSEzVVp2oyGCCKNxOKsX9s5iXSyVG8/:pkUQVcA5f+fHqt3XSq1CbhsX9HhMnnu

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5c9cce6e1cac73a2f39d20105dccd3808d3bb98a9da304a20cf6cb30052b981.exe
    "C:\Users\Admin\AppData\Local\Temp\d5c9cce6e1cac73a2f39d20105dccd3808d3bb98a9da304a20cf6cb30052b981.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\qKcIEUkw\CCgwwIYo.exe
      "C:\Users\Admin\qKcIEUkw\CCgwwIYo.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:1316
    • C:\ProgramData\IqUkooEw\DmEEAIsk.exe
      "C:\ProgramData\IqUkooEw\DmEEAIsk.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1444
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe
        C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe
        3⤵
        • Executes dropped EXE
        PID:4532
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:4700
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:4140
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:3008
  • C:\ProgramData\bwksgMYI\BewQksAI.exe
    C:\ProgramData\bwksgMYI\BewQksAI.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:632

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\IqUkooEw\DmEEAIsk.exe
    Filesize

    431KB

    MD5

    ea0b40caa7e156c4e0593f6d7f4f7aab

    SHA1

    0f2b72f8daf5d1bbae014200388f153c0f1c3a27

    SHA256

    6202fb4cbd2b15030bc26091502708379f1601fbc86e5377e4bbdd8efe0c0288

    SHA512

    4d6610e1e0ca01df9f91fafe898b9fa41fc8e3c1d5859116f212dd094f7ff0cb5862e76072a92e609b8437587253049136a903bf344d2aaf6cac54369d832bab

  • C:\ProgramData\IqUkooEw\DmEEAIsk.exe
    Filesize

    431KB

    MD5

    ea0b40caa7e156c4e0593f6d7f4f7aab

    SHA1

    0f2b72f8daf5d1bbae014200388f153c0f1c3a27

    SHA256

    6202fb4cbd2b15030bc26091502708379f1601fbc86e5377e4bbdd8efe0c0288

    SHA512

    4d6610e1e0ca01df9f91fafe898b9fa41fc8e3c1d5859116f212dd094f7ff0cb5862e76072a92e609b8437587253049136a903bf344d2aaf6cac54369d832bab

  • C:\ProgramData\bwksgMYI\BewQksAI.exe
    Filesize

    433KB

    MD5

    c3af078891202785ad24df1ff4643074

    SHA1

    b920a467c6fae8bd0138df57d2174b69ce1457e2

    SHA256

    6e2359c866f4791ac5972f048c9a400f8b4f8d012e9126c350d4a730669540e9

    SHA512

    38e2b37a51ce300bb34cdde60d19d953b1df5aa1db2f416dbc3d743597bb3b8144b753d9d81d06e21bdcdef289636044cd1c3ca6d32770a8a6611e81ddf2d3a6

  • C:\ProgramData\bwksgMYI\BewQksAI.exe
    Filesize

    433KB

    MD5

    c3af078891202785ad24df1ff4643074

    SHA1

    b920a467c6fae8bd0138df57d2174b69ce1457e2

    SHA256

    6e2359c866f4791ac5972f048c9a400f8b4f8d012e9126c350d4a730669540e9

    SHA512

    38e2b37a51ce300bb34cdde60d19d953b1df5aa1db2f416dbc3d743597bb3b8144b753d9d81d06e21bdcdef289636044cd1c3ca6d32770a8a6611e81ddf2d3a6

  • C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe
    Filesize

    24KB

    MD5

    c6b3c81dff28dce882ba4f9f1d428423

    SHA1

    2d31bae0b83b12511a49a81938fd350e5c687331

    SHA256

    9e09478d6a518fd99520c36cadf415d34c52efc444dfc8bb8edbf92af66ca788

    SHA512

    fa19706c17659976402380ee2852470092272300366d677d6ddf66713627e5619ef32614f35f75f02475c99777da1e691a3c538b01bcd329177fa251b0f838a6

  • C:\Users\Admin\AppData\Local\Temp\Bginfo64.exe
    Filesize

    24KB

    MD5

    c6b3c81dff28dce882ba4f9f1d428423

    SHA1

    2d31bae0b83b12511a49a81938fd350e5c687331

    SHA256

    9e09478d6a518fd99520c36cadf415d34c52efc444dfc8bb8edbf92af66ca788

    SHA512

    fa19706c17659976402380ee2852470092272300366d677d6ddf66713627e5619ef32614f35f75f02475c99777da1e691a3c538b01bcd329177fa251b0f838a6

  • C:\Users\Admin\qKcIEUkw\CCgwwIYo.exe
    Filesize

    433KB

    MD5

    4bc61f59268cc8b7a5f932f2e44b7480

    SHA1

    36762095d70e570587ed2818f57020029565afe2

    SHA256

    2ac6e3f0bdb37a344437227fbcce593227fe44aa761d83aa58e169591cdb500c

    SHA512

    c66f53569228bef60cde5d5e4637099dd23465b7549ac64879f127335fb6896b6e985911291581783a6cae4d705392e35b99161de78cb5fc6d938b4c2d1b2184

  • C:\Users\Admin\qKcIEUkw\CCgwwIYo.exe
    Filesize

    433KB

    MD5

    4bc61f59268cc8b7a5f932f2e44b7480

    SHA1

    36762095d70e570587ed2818f57020029565afe2

    SHA256

    2ac6e3f0bdb37a344437227fbcce593227fe44aa761d83aa58e169591cdb500c

    SHA512

    c66f53569228bef60cde5d5e4637099dd23465b7549ac64879f127335fb6896b6e985911291581783a6cae4d705392e35b99161de78cb5fc6d938b4c2d1b2184

  • memory/632-143-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/632-156-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/1292-132-0x0000000000400000-0x0000000000477000-memory.dmp
    Filesize

    476KB

  • memory/1292-153-0x0000000000400000-0x0000000000477000-memory.dmp
    Filesize

    476KB

  • memory/1316-141-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/1316-133-0x0000000000000000-mapping.dmp
  • memory/1316-154-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/1444-142-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/1444-136-0x0000000000000000-mapping.dmp
  • memory/1444-155-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/2808-144-0x0000000000000000-mapping.dmp
  • memory/3008-150-0x0000000000000000-mapping.dmp
  • memory/4140-149-0x0000000000000000-mapping.dmp
  • memory/4532-151-0x0000000000800000-0x000000000080C000-memory.dmp
    Filesize

    48KB

  • memory/4532-152-0x00007FF970940000-0x00007FF971401000-memory.dmp
    Filesize

    10.8MB

  • memory/4532-145-0x0000000000000000-mapping.dmp
  • memory/4700-148-0x0000000000000000-mapping.dmp