Analysis

  • max time kernel
    207s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 21:17

General

  • Target

    a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe

  • Size

    6KB

  • MD5

    4071b80a44bb81884f23a0ee6271d7fb

  • SHA1

    f46d73df19a6f1817e8c687fae2bc39aaae80afc

  • SHA256

    a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c

  • SHA512

    9404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f

  • SSDEEP

    96:YsQ8fMP4xz0hJd7cTErH8vW5BbTNYi+K5v/ZjBC1e1HwqrkqdiiX:3QUMPezkOCBb9ss1Hwqr1d5X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe
    "C:\Users\Admin\AppData\Local\Temp\a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Program Files (x86)\tinyproxy\tinyproxy1.exe" TINYPROXY ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:864
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add portopening TCP 80 TINYPROXY
      2⤵
      • Modifies Windows Firewall
      PID:4612
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add portopening TCP 53 TINYPROXY
      2⤵
      • Modifies Windows Firewall
      PID:1092
    • C:\Program Files (x86)\tinyproxy\tinyproxy1.exe
      "C:\Program Files (x86)\tinyproxy\tinyproxy1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\tinyproxy\tinyproxy1.exe

    Filesize

    6KB

    MD5

    4071b80a44bb81884f23a0ee6271d7fb

    SHA1

    f46d73df19a6f1817e8c687fae2bc39aaae80afc

    SHA256

    a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c

    SHA512

    9404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f

  • C:\Program Files (x86)\tinyproxy\tinyproxy1.exe

    Filesize

    6KB

    MD5

    4071b80a44bb81884f23a0ee6271d7fb

    SHA1

    f46d73df19a6f1817e8c687fae2bc39aaae80afc

    SHA256

    a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c

    SHA512

    9404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tkblmjt0.default-release\prefs.js

    Filesize

    6KB

    MD5

    daae82458670232b65c45791c32809af

    SHA1

    242ccc7723802613118afe59fadcae1c00cdc78d

    SHA256

    f8d2224e460582ddee3b0bf96f78031f410c3383dc8d28e9d2411445962be6c3

    SHA512

    4f6b743543eb9d9b3984ccfd4a3b22cf71b3f9225d1ce81e032333ad4e2bdc2ad21daf4af9acff2990e573c4d9fe1d9b957a6c562bc78f04b5904ea5847cce92

  • memory/448-133-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2376-140-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2376-141-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB