Analysis

  • max time kernel
    300s
  • max time network
    311s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    01/12/2022, 18:59

General

  • Target

    a.exe

  • Size

    384KB

  • MD5

    30e589f50658e3dea377e5550d58f0e3

  • SHA1

    7b38309c0a1f44a0f803d0a6e038f3f407b78a7e

  • SHA256

    61586ec214417f429259995e9d39fe5ca25fbbb2758ea03d93740b5bdc39136e

  • SHA512

    9c7487e504d016e2b8b2d55675badf294f0913067ef0fc05178e8b7f240f3e52f09adfd03002c42870aa814a9c6deb1eb281c07ac7b32a4fbcabccba2db868c8

  • SSDEEP

    12288:3sdXFfP7nn+brDT/nMmqM3ioVTPee9t5sgoJqrz:3OXFn7n+brvnvqMSoVTGK5s7J4z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a.exe
    "C:\Users\Admin\AppData\Local\Temp\a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\7zS042AF236\setup-stub.exe
      .\setup-stub.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS042AF236\setup-stub.exe

    Filesize

    464KB

    MD5

    32b1aed8cda8677b31c3cec33b982462

    SHA1

    5966299d342e5c0a123551c49f97324494cd48ea

    SHA256

    d7840eea40a5a88af824f24473e95d0227e69c4439d6ea791d50cb94bf0cfb2a

    SHA512

    b9b33072350eff2f90e8e5bb84af9c78592c39bebeb8abc5775eb4f2cf87de2873e42d2ed3124772ead4b18a5618bf4a519bf334de0d07f2e87f5862c55454c7

  • C:\Users\Admin\AppData\Local\Temp\7zS042AF236\setup-stub.exe

    Filesize

    464KB

    MD5

    32b1aed8cda8677b31c3cec33b982462

    SHA1

    5966299d342e5c0a123551c49f97324494cd48ea

    SHA256

    d7840eea40a5a88af824f24473e95d0227e69c4439d6ea791d50cb94bf0cfb2a

    SHA512

    b9b33072350eff2f90e8e5bb84af9c78592c39bebeb8abc5775eb4f2cf87de2873e42d2ed3124772ead4b18a5618bf4a519bf334de0d07f2e87f5862c55454c7

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\CityHash.dll

    Filesize

    43KB

    MD5

    737379945745bb94f8a0dadcc18cad8d

    SHA1

    6a1f497b4dc007f5935b66ec83b00e5a394332c6

    SHA256

    d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

    SHA512

    c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\CityHash.dll

    Filesize

    43KB

    MD5

    737379945745bb94f8a0dadcc18cad8d

    SHA1

    6a1f497b4dc007f5935b66ec83b00e5a394332c6

    SHA256

    d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

    SHA512

    c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\InetBgDL.dll

    Filesize

    7KB

    MD5

    d4f7b4f9c296308e03a55cb0896a92fc

    SHA1

    63065bed300926a5b39eabf6efdf9296ed46e0cc

    SHA256

    6b553f94ac133d8e70fac0fcaa01217fae24f85d134d3964c1beea278191cf83

    SHA512

    d4acc719ae29c53845ccf4778e1d7ed67f30358af30545fc744facdb9f4e3b05d8cb7dc5e72c93895259e9882471c056395ab2e6f238310841b767d6acbcd6c1

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\System.dll

    Filesize

    11KB

    MD5

    17ed1c86bd67e78ade4712be48a7d2bd

    SHA1

    1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    SHA256

    bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    SHA512

    0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UAC.dll

    Filesize

    18KB

    MD5

    113c5f02686d865bc9e8332350274fd1

    SHA1

    4fa4414666f8091e327adb4d81a98a0d6e2e254a

    SHA256

    0d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d

    SHA512

    e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UAC.dll

    Filesize

    18KB

    MD5

    113c5f02686d865bc9e8332350274fd1

    SHA1

    4fa4414666f8091e327adb4d81a98a0d6e2e254a

    SHA256

    0d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d

    SHA512

    e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • C:\Users\Admin\AppData\Local\Temp\nsu887F.tmp\WebBrowser.dll

    Filesize

    93KB

    MD5

    dfe24aa39f009e9d98b20b7c9cc070b1

    SHA1

    f48e4923c95466f689e8c5408265b52437ed2701

    SHA256

    8ec65a3d8ae8a290a6066773e49387fd368f5697392dfb58eac1b63640e30444

    SHA512

    665ce32d3776b1b41f95ed685054a796d0c1938dbc237619fa6309d1b52ae3bd44e3cf0a1f53ebf88556f7603111cca6dff1bfc917a911e0a9ce04affd0d5261

  • memory/1540-145-0x00000000022F0000-0x00000000022F8000-memory.dmp

    Filesize

    32KB

  • memory/1540-138-0x00000000022F1000-0x00000000022F5000-memory.dmp

    Filesize

    16KB