Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/01/2023, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win7-20221111-en
General
-
Target
d27b20602db59697c20293d02aef1e433f98baf4.exe
-
Size
1.2MB
-
MD5
9190513275b80db066cc1a2275c01af1
-
SHA1
d27b20602db59697c20293d02aef1e433f98baf4
-
SHA256
36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00
-
SHA512
c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc
-
SSDEEP
12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 468 cmd.exe 13 468 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 468 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 944 set thread context of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 1608 set thread context of 1268 1608 SetupUtility.exe 14 PID 468 set thread context of 1268 468 cmd.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 1608 SetupUtility.exe 1608 SetupUtility.exe 1608 SetupUtility.exe 1608 SetupUtility.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1608 SetupUtility.exe 1608 SetupUtility.exe 1608 SetupUtility.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe 468 cmd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 944 d27b20602db59697c20293d02aef1e433f98baf4.exe Token: SeDebugPrivilege 1608 SetupUtility.exe Token: SeShutdownPrivilege 1268 Explorer.EXE Token: SeShutdownPrivilege 1268 Explorer.EXE Token: SeDebugPrivilege 468 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 944 wrote to memory of 756 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 29 PID 944 wrote to memory of 756 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 29 PID 944 wrote to memory of 756 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 29 PID 944 wrote to memory of 560 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 30 PID 944 wrote to memory of 560 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 30 PID 944 wrote to memory of 560 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 30 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 944 wrote to memory of 1608 944 d27b20602db59697c20293d02aef1e433f98baf4.exe 31 PID 1268 wrote to memory of 468 1268 Explorer.EXE 32 PID 1268 wrote to memory of 468 1268 Explorer.EXE 32 PID 1268 wrote to memory of 468 1268 Explorer.EXE 32 PID 1268 wrote to memory of 468 1268 Explorer.EXE 32 PID 468 wrote to memory of 1564 468 cmd.exe 35 PID 468 wrote to memory of 1564 468 cmd.exe 35 PID 468 wrote to memory of 1564 468 cmd.exe 35 PID 468 wrote to memory of 1564 468 cmd.exe 35 PID 468 wrote to memory of 1564 468 cmd.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"3⤵PID:756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"3⤵PID:560
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
949KB
MD538a3e021eb32c9976adaf0b3372080fc
SHA168e02803c646be21007d90bec841c176b82211fd
SHA2568cde0275d60da0d11954f73c7c8862cfc4b306f61bb8b1ce14abe4a193af2652
SHA512b886cc112f2750e7300b66f7242850659fa49fdc97f75aed376cb9f5440875f303a143bf8b51068ec42674f1ebe1dfcc40534f3a7aed3cc4d20f9274b9a66d18