Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 20:33

General

  • Target

    f2ea3d83f8a4a51e1aed9b09cb3499dda921a9655fd66bb27fc6e498889b29b4.exe

  • Size

    1.1MB

  • MD5

    018461e97a1ca897ccfe1c132e62eef5

  • SHA1

    2d58168f1b453243a2926bbdf3070e4ae96bcc15

  • SHA256

    f2ea3d83f8a4a51e1aed9b09cb3499dda921a9655fd66bb27fc6e498889b29b4

  • SHA512

    a4a452bdb1fd280a7e3a1c9e072791ffa9363fbaeefa548ccb128aa4cdac3d24e8be8f30d77e40dc88bacfec5ee3c8c19a3322a07514ca7af44473bf3f6ce1ee

  • SSDEEP

    24576:jd1Br532aw6OVjczrb0qsHKOxs6SvI42uFzpe/8fcxkm0yjax:DBrMaw6Ohwn4s6SV2uQ8ExBO

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2ea3d83f8a4a51e1aed9b09cb3499dda921a9655fd66bb27fc6e498889b29b4.exe
    "C:\Users\Admin\AppData\Local\Temp\f2ea3d83f8a4a51e1aed9b09cb3499dda921a9655fd66bb27fc6e498889b29b4.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4988
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
    • Modifies data under HKEY_USERS
    PID:4124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4124-134-0x00007FFD33E00000-0x00007FFD33E02000-memory.dmp

    Filesize

    8KB

  • memory/4988-132-0x0000000000400000-0x0000000000737000-memory.dmp

    Filesize

    3.2MB

  • memory/4988-133-0x00000000009FD000-0x0000000000A00000-memory.dmp

    Filesize

    12KB

  • memory/4988-135-0x0000000000400000-0x0000000000737000-memory.dmp

    Filesize

    3.2MB