Analysis
-
max time kernel
164s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 10:00
Behavioral task
behavioral1
Sample
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
Resource
win10v2004-20221111-en
General
-
Target
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe
-
Size
362KB
-
MD5
d77fa14d6295188b4af7954b3c8f1a38
-
SHA1
7acef1bd3b324546c91862eb5f54773d1d28df20
-
SHA256
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28
-
SHA512
f016d54979979d2ff649764e57c6b048cf3fc690cc1aa0b743c1be985f58b4705636b67487c8fb5bee48251a459cc33ffd478a434e3668e0e86cb7a0fabef184
-
SSDEEP
6144:x7/8yCh1wTvyk4vr4RNvKaJlllbXXPyCO8E7ih/kN5CtH9k8ryIV5G8Cb++1tdv:x77BTjCMRZfJlXf/O8mIICtH7HCb+6tt
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\SysWOW64\msikmw32.dll acprotect C:\Windows\SysWOW64\msikmw32.dll acprotect -
Processes:
resource yara_rule behavioral2/memory/4588-132-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4588-133-0x0000000000400000-0x000000000046C000-memory.dmp upx C:\Windows\SysWOW64\msikmw32.dll upx C:\Windows\SysWOW64\msikmw32.dll upx behavioral2/memory/4440-140-0x0000000010000000-0x0000000010088000-memory.dmp upx behavioral2/memory/4588-143-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4440 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msikmw32.dll,XzXRQcUSq" 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription ioc process File created C:\Windows\SysWOW64\msikmw32.dll 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe File opened for modification C:\Windows\SysWOW64\msikmw32.dll 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2232 4588 WerFault.exe 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4948 4588 WerFault.exe 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exepid process 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exedescription pid process target process PID 4588 wrote to memory of 4440 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 4588 wrote to memory of 4440 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 4588 wrote to memory of 4440 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe rundll32.exe PID 4588 wrote to memory of 2232 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe PID 4588 wrote to memory of 2232 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe PID 4588 wrote to memory of 2232 4588 5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe"C:\Users\Admin\AppData\Local\Temp\5195bd647e93ce3bbb304e507e551318929279334527d65c6286018d48cdad28.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msikmw32.dll,XzXRQcUSq2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 6962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 6962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4588 -ip 45881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\msikmw32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
C:\Windows\SysWOW64\msikmw32.dllFilesize
174KB
MD5e8f30e1c5099edd4ee2d24cad67c333c
SHA1bcd3f120cb6d99ef27e7bcc8822ca3d9b40faa4b
SHA256cbfb7f70b2442f72d4172f349d0d92686dd864e223438e2331f3741a796852f7
SHA512883d6a71a2c7dd48b6fc1f54198666678e0b4ed2a3d77109bdad06491faa16635d0d7452f62f8c69a4d309fabed61e4acad9cdfd315440cb2f70925ff7d0b4f1
-
memory/2232-142-0x0000000000000000-mapping.dmp
-
memory/4440-136-0x0000000000000000-mapping.dmp
-
memory/4440-140-0x0000000010000000-0x0000000010088000-memory.dmpFilesize
544KB
-
memory/4588-132-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4588-133-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4588-134-0x0000000002310000-0x000000000236A000-memory.dmpFilesize
360KB
-
memory/4588-135-0x0000000002950000-0x00000000029D8000-memory.dmpFilesize
544KB
-
memory/4588-139-0x0000000002950000-0x00000000029D8000-memory.dmpFilesize
544KB
-
memory/4588-141-0x0000000002310000-0x000000000236A000-memory.dmpFilesize
360KB
-
memory/4588-143-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB