Analysis

  • max time kernel
    54s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    07/02/2023, 23:31

General

  • Target

    KakaoTalk_Setup_0654478763.exe

  • Size

    2.9MB

  • MD5

    85d03cef0650f1de5892f5b8f6ffa071

  • SHA1

    8c6f91a2422af072116694d4e0571fd41fc91d8f

  • SHA256

    69f3d3cff5d4fba761fc3f7428bc1ef12fd00f4c0ea4005dbc884ffa43ca1eb1

  • SHA512

    b5e747faf52b5a29c1b0dd9127f9fcb26a56b4aa9bb9b21edbbd7bd9b9a05933fb8b81ea7698ab8e60f2789d3d5094ee9b63db90e87efecd9e39c687fd192139

  • SSDEEP

    49152:b7YO2rebc5AQEybcH3SFUph5sGBp2KSf6eAAWVkBKBW2aM8HmoXw3:vsN7EybcC+ph53psf6rnkBKcQ8HmoXQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KakaoTalk_Setup_0654478763.exe
    "C:\Users\Admin\AppData\Local\Temp\KakaoTalk_Setup_0654478763.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\KakaoTalk_Setup_0654478763.exe
      "C:\Users\Admin\AppData\Local\Temp\KakaoTalk_Setup_0654478763.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg== /mnl
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:868
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4912
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 460 -p 1012 -ip 1012
    1⤵
      PID:1488
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1012 -s 2908
      1⤵
      • Program crash
      PID:2440

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\inH24055354613606\libeay32.dll

            Filesize

            1.3MB

            MD5

            800eabf55778cc35d894d165b378b04e

            SHA1

            9c49ab6c8a6927498dc50c1c2c821cadff61df5f

            SHA256

            d252d06211167ee8cf442a7bf2dea92addc2edc497cd5ab00afe57414a81038f

            SHA512

            c5b05c9572e8855cf641d77800e73da029e09ceb660291f54975af2de0eff2a81a5081f557298bcf20ba2271185519b819a964bb2002dd208a9f89a68b1be228

          • C:\Users\Admin\AppData\Local\Temp\inH24055354613606\ssleay32.dll

            Filesize

            330KB

            MD5

            61cffdde659367c1b8852cc9dbe50068

            SHA1

            04a880c4ae1588e4deaad489e4008bf090f55913

            SHA256

            ad67cbc56e500b24a297830cea6e4131b4f30ee9184a26751cc416a24fe2c87f

            SHA512

            3c6e9390c5a852efd900299c0bcc403434307a86eba05d725f8df49b7660c5962a585ea19e1b51aa31e422e01389e0bfab6d81925c6d9273be2015c2a9b6e9b2

          • memory/868-174-0x0000000002630000-0x0000000002893000-memory.dmp

            Filesize

            2.4MB

          • memory/868-184-0x0000000002C00000-0x0000000002E70000-memory.dmp

            Filesize

            2.4MB

          • memory/868-177-0x00000000038A0000-0x0000000003D6B000-memory.dmp

            Filesize

            4.8MB

          • memory/868-176-0x0000000002C00000-0x0000000002E70000-memory.dmp

            Filesize

            2.4MB

          • memory/868-175-0x0000000002631000-0x000000000288D000-memory.dmp

            Filesize

            2.4MB

          • memory/868-167-0x0000000002630000-0x0000000002893000-memory.dmp

            Filesize

            2.4MB

          • memory/868-161-0x0000000002630000-0x0000000002893000-memory.dmp

            Filesize

            2.4MB

          • memory/868-160-0x00000000023C0000-0x0000000002622000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-151-0x0000000002B60000-0x0000000002DD0000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-138-0x0000000002590000-0x00000000027F3000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-145-0x00000000020B0000-0x0000000002316000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-150-0x0000000003800000-0x0000000003CCB000-memory.dmp

            Filesize

            4.8MB

          • memory/2092-132-0x0000000002590000-0x00000000027F3000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-146-0x0000000002320000-0x0000000002582000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-149-0x0000000002900000-0x0000000002B52000-memory.dmp

            Filesize

            2.3MB

          • memory/2092-148-0x0000000002591000-0x00000000027ED000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-183-0x0000000002B60000-0x0000000002DD0000-memory.dmp

            Filesize

            2.4MB

          • memory/2092-147-0x0000000002590000-0x00000000027F3000-memory.dmp

            Filesize

            2.4MB