Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2023 07:19

General

  • Target

    d27b20602db59697c20293d02aef1e433f98baf4.exe

  • Size

    1.2MB

  • MD5

    9190513275b80db066cc1a2275c01af1

  • SHA1

    d27b20602db59697c20293d02aef1e433f98baf4

  • SHA256

    36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00

  • SHA512

    c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc

  • SSDEEP

    12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe
      "C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
        3⤵
          PID:3328
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
          3⤵
            PID:1132
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2880
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe"
          2⤵
          • Blocklisted process makes network request
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:5036
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 5036 -s 188
                4⤵
                • Program crash
                PID:3476
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 452 -p 5036 -ip 5036
          1⤵
            PID:4116

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2376-141-0x00000000033C0000-0x00000000034E0000-memory.dmp

            Filesize

            1.1MB

          • memory/2376-150-0x00000000084E0000-0x00000000085B2000-memory.dmp

            Filesize

            840KB

          • memory/2376-148-0x00000000084E0000-0x00000000085B2000-memory.dmp

            Filesize

            840KB

          • memory/2564-133-0x00007FFD78570000-0x00007FFD79031000-memory.dmp

            Filesize

            10.8MB

          • memory/2564-136-0x00007FFD78570000-0x00007FFD79031000-memory.dmp

            Filesize

            10.8MB

          • memory/2564-132-0x0000019E5A1B0000-0x0000019E5A2E8000-memory.dmp

            Filesize

            1.2MB

          • memory/2728-144-0x0000000000BE0000-0x0000000000BF4000-memory.dmp

            Filesize

            80KB

          • memory/2728-142-0x0000000000000000-mapping.dmp

          • memory/2728-145-0x0000000000BB0000-0x0000000000BDD000-memory.dmp

            Filesize

            180KB

          • memory/2728-146-0x0000000002C80000-0x0000000002FCA000-memory.dmp

            Filesize

            3.3MB

          • memory/2728-147-0x0000000002AD0000-0x0000000002B5F000-memory.dmp

            Filesize

            572KB

          • memory/2728-149-0x0000000000BB0000-0x0000000000BDD000-memory.dmp

            Filesize

            180KB

          • memory/2880-139-0x00000000012A0000-0x00000000015EA000-memory.dmp

            Filesize

            3.3MB

          • memory/2880-140-0x0000000000C50000-0x0000000000C60000-memory.dmp

            Filesize

            64KB

          • memory/2880-138-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2880-143-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2880-137-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2880-135-0x00000000004012E0-mapping.dmp

          • memory/2880-134-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB