Analysis
-
max time kernel
207s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:17
Behavioral task
behavioral1
Sample
a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe
Resource
win10v2004-20221111-en
General
-
Target
a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe
-
Size
6KB
-
MD5
4071b80a44bb81884f23a0ee6271d7fb
-
SHA1
f46d73df19a6f1817e8c687fae2bc39aaae80afc
-
SHA256
a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c
-
SHA512
9404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f
-
SSDEEP
96:YsQ8fMP4xz0hJd7cTErH8vW5BbTNYi+K5v/ZjBC1e1HwqrkqdiiX:3QUMPezkOCBb9ss1Hwqr1d5X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 tinyproxy1.exe -
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 864 netsh.exe 4612 netsh.exe 1092 netsh.exe -
resource yara_rule behavioral2/memory/448-133-0x0000000000400000-0x0000000000406000-memory.dmp upx behavioral2/files/0x0002000000022657-134.dat upx behavioral2/files/0x0002000000022657-138.dat upx behavioral2/memory/2376-140-0x0000000000400000-0x0000000000406000-memory.dmp upx behavioral2/memory/2376-141-0x0000000000400000-0x0000000000406000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tinyproxy = "C:\\Program Files (x86)\\tinyproxy\\tinyproxy1.exe" a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\tinyproxy\tinyproxy1.exe a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe File opened for modification C:\Program Files (x86)\tinyproxy\tinyproxy1.exe a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 2376 tinyproxy1.exe 2376 tinyproxy1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe Token: SeDebugPrivilege 2376 tinyproxy1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 448 wrote to memory of 864 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 82 PID 448 wrote to memory of 864 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 82 PID 448 wrote to memory of 864 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 82 PID 448 wrote to memory of 4612 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 84 PID 448 wrote to memory of 4612 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 84 PID 448 wrote to memory of 4612 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 84 PID 448 wrote to memory of 1092 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 86 PID 448 wrote to memory of 1092 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 86 PID 448 wrote to memory of 1092 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 86 PID 448 wrote to memory of 2376 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 88 PID 448 wrote to memory of 2376 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 88 PID 448 wrote to memory of 2376 448 a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe"C:\Users\Admin\AppData\Local\Temp\a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\tinyproxy\tinyproxy1.exe" TINYPROXY ENABLE2⤵
- Modifies Windows Firewall
PID:864
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 80 TINYPROXY2⤵
- Modifies Windows Firewall
PID:4612
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 53 TINYPROXY2⤵
- Modifies Windows Firewall
PID:1092
-
-
C:\Program Files (x86)\tinyproxy\tinyproxy1.exe"C:\Program Files (x86)\tinyproxy\tinyproxy1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54071b80a44bb81884f23a0ee6271d7fb
SHA1f46d73df19a6f1817e8c687fae2bc39aaae80afc
SHA256a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c
SHA5129404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f
-
Filesize
6KB
MD54071b80a44bb81884f23a0ee6271d7fb
SHA1f46d73df19a6f1817e8c687fae2bc39aaae80afc
SHA256a5528f9c2461005de047883cb16f1feae811f321224f3e181dcb21b879305b4c
SHA5129404c2161e92dbf72c15b073ba45a3eebcca3d02800c089c9db161daab2cf7e8df6f6ac40a60ececfee25e7fb4423a000848629d8d3cdc704e12b38cf6a9850f
-
Filesize
6KB
MD5daae82458670232b65c45791c32809af
SHA1242ccc7723802613118afe59fadcae1c00cdc78d
SHA256f8d2224e460582ddee3b0bf96f78031f410c3383dc8d28e9d2411445962be6c3
SHA5124f6b743543eb9d9b3984ccfd4a3b22cf71b3f9225d1ce81e032333ad4e2bdc2ad21daf4af9acff2990e573c4d9fe1d9b957a6c562bc78f04b5904ea5847cce92