Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2023 07:35

General

  • Target

    d27b20602db59697c20293d02aef1e433f98baf4.exe

  • Size

    1.2MB

  • MD5

    9190513275b80db066cc1a2275c01af1

  • SHA1

    d27b20602db59697c20293d02aef1e433f98baf4

  • SHA256

    36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00

  • SHA512

    c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc

  • SSDEEP

    12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe
      "C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
        3⤵
          PID:2792
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
          3⤵
            PID:3280
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
            3⤵
              PID:5088
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
              3⤵
                PID:4152
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
                3⤵
                  PID:3848
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                  3⤵
                    PID:936
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                    3⤵
                      PID:920
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"
                      3⤵
                        PID:924
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
                        3⤵
                          PID:1972
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"
                          3⤵
                            PID:1128
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"
                            3⤵
                              PID:1376
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                              3⤵
                                PID:1652
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                                3⤵
                                  PID:3528
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                                  3⤵
                                    PID:1664
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                                    3⤵
                                      PID:1596
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                                      3⤵
                                        PID:5112
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
                                        3⤵
                                          PID:1840
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                                          3⤵
                                            PID:1828
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
                                            3⤵
                                              PID:4252
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                              3⤵
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4576
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                                              3⤵
                                                PID:3276
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
                                                3⤵
                                                  PID:4456
                                              • C:\Windows\SysWOW64\wscript.exe
                                                "C:\Windows\SysWOW64\wscript.exe"
                                                2⤵
                                                • Blocklisted process makes network request
                                                • Suspicious use of SetThreadContext
                                                • Modifies Internet Explorer settings
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: MapViewOfSection
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4248
                                                • C:\Program Files\Mozilla Firefox\Firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                  3⤵
                                                    PID:1500
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 1500 -s 192
                                                      4⤵
                                                      • Program crash
                                                      PID:1312
                                              • C:\Windows\system32\WerFault.exe
                                                C:\Windows\system32\WerFault.exe -pss -s 460 -p 1500 -ip 1500
                                                1⤵
                                                  PID:2832

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • memory/1976-133-0x00007FFD3A8C0000-0x00007FFD3B381000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/1976-136-0x00007FFD3A8C0000-0x00007FFD3B381000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/1976-132-0x00000223EC7B0000-0x00000223EC8E8000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/2724-141-0x0000000008C20000-0x0000000008CDE000-memory.dmp

                                                  Filesize

                                                  760KB

                                                • memory/2724-150-0x0000000008CE0000-0x0000000008DBB000-memory.dmp

                                                  Filesize

                                                  876KB

                                                • memory/2724-148-0x0000000008CE0000-0x0000000008DBB000-memory.dmp

                                                  Filesize

                                                  876KB

                                                • memory/4248-144-0x0000000000340000-0x0000000000367000-memory.dmp

                                                  Filesize

                                                  156KB

                                                • memory/4248-145-0x0000000000300000-0x000000000032D000-memory.dmp

                                                  Filesize

                                                  180KB

                                                • memory/4248-146-0x00000000027B0000-0x0000000002AFA000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4248-147-0x00000000025D0000-0x000000000265F000-memory.dmp

                                                  Filesize

                                                  572KB

                                                • memory/4248-149-0x0000000000300000-0x000000000032D000-memory.dmp

                                                  Filesize

                                                  180KB

                                                • memory/4576-139-0x0000000000400000-0x000000000042F000-memory.dmp

                                                  Filesize

                                                  188KB

                                                • memory/4576-140-0x0000000001420000-0x0000000001430000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4576-138-0x0000000001960000-0x0000000001CAA000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4576-143-0x0000000000400000-0x000000000042F000-memory.dmp

                                                  Filesize

                                                  188KB

                                                • memory/4576-137-0x0000000000400000-0x000000000042F000-memory.dmp

                                                  Filesize

                                                  188KB

                                                • memory/4576-134-0x0000000000400000-0x000000000042F000-memory.dmp

                                                  Filesize

                                                  188KB