Analysis

  • max time kernel
    151s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 10:26

General

  • Target

    7ca121ff5c760f6bfa11594cbe25c3a6fb6c24561de6d3ef1c7b23aeae449f9e.exe

  • Size

    645KB

  • MD5

    b424710b79185ad60748f5b53f9a9ac4

  • SHA1

    f1f297a8368ebf66fca8cf9a1fa834c515a9f73a

  • SHA256

    7ca121ff5c760f6bfa11594cbe25c3a6fb6c24561de6d3ef1c7b23aeae449f9e

  • SHA512

    b6a28c32a32869d72de32588811dc84bd20128a3a4c57d5ce0e5d6f1b2ea7b7f74bbbacf039c180fbe186d9b85cd65af7b723a1239a1134a40f6b2698f531f10

  • SSDEEP

    12288:fpWXo5HX6UAttLUi7AWRyG234MvskU94TRFnYivlfSjsfKG6J34a:fk453hM1pYTIAsYnYYNNb6J

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ca121ff5c760f6bfa11594cbe25c3a6fb6c24561de6d3ef1c7b23aeae449f9e.exe
    "C:\Users\Admin\AppData\Local\Temp\7ca121ff5c760f6bfa11594cbe25c3a6fb6c24561de6d3ef1c7b23aeae449f9e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\CBC.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\Local Settings\Application Data\Mozilla\Firefox\Profiles\*.default" /B
        3⤵
          PID:1040
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c dir "C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\*.default" /B
          3⤵
            PID:1148
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1312

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\CBC.bat

          Filesize

          5KB

          MD5

          8191690bad902792af6cf44a6a69397e

          SHA1

          fb2e16335b52d52bf083b9d88d4b6762ab0abca8

          SHA256

          eee3a160f727210c24e6f6fd60fa725e48fceafb089b656799c6c7dbc11b3bb3

          SHA512

          0db38a368860e7cc184af8f790b4728b433ad2e3975758ef52807ad1c626ef57f851eceaa7c60c157f38af77cc74b8d00e03b429b615403c022a2de728e59085

        • \Users\Admin\AppData\Local\Temp\D5C141\AyDBBxu.dll

          Filesize

          480KB

          MD5

          f40ffec1ffda201b742556e58a78b154

          SHA1

          745392fb10d1824d1b00b8c16d13d217b4302d8c

          SHA256

          17a2512c5254caa0d59c061b14aa2086ae9383fa5ce0356d4289f731920d3597

          SHA512

          bda3b1f9537b0ca8766952decd7e7209213447893103fb9527b2c0d8d5641fef70d645f4451459d29fb55adfd42dcf4f24c8d672e9b4ba7bef946a8f0b0cf79c

        • \Users\Admin\AppData\Local\Temp\D5C141\slmrwov.dll

          Filesize

          530KB

          MD5

          7d041375081662a8dc7e1bc04095185a

          SHA1

          90c2fa1c0f08490a5104e300bbf8637f356ec077

          SHA256

          5c066ca9c8fe87eee78e2207da0f89dc87a60ecb3d7b11cf5aa04bdadda118df

          SHA512

          9cd0beabbb981124b19dbbbb4c2ad0b4be8bdc2309a3d865393233d314824e3aa872fa2c5d00c57a216d8aff7fdab2dd9f7df4fca3e07ffe880f94c20016e510

        • memory/956-56-0x0000000075591000-0x0000000075593000-memory.dmp

          Filesize

          8KB