Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2023 21:38

General

  • Target

    TeamViewer QS V11.exe

  • Size

    9.4MB

  • MD5

    199769cacd06b985dc18c32eef5234bc

  • SHA1

    cd69d0b21a375fae431517b53ce6489d8bf45fbd

  • SHA256

    fbe4c2bdb3e870c335f5f9d12967bd04695d0100d97a19b069acbac713ab47a8

  • SHA512

    87ec7583864d176183636d392b17deed78adfaa5d22d07430408562177b1d9e10b95398a1852a19e6e1fed4b91c35ee3cbd9f303be5bbfdf4edcf89b7716e9b0

  • SSDEEP

    196608:sUaqygKJFy1lSC+qCren5HKoJ6qVx+P+HywuPcBEH:VaqF1lSCfmcx6+S7kBEH

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer QS V11.exe
    "C:\Users\Admin\AppData\Local\Temp\TeamViewer QS V11.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
      "C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_w32.exe
        "C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_w32.exe" --action hooks --log C:\Users\Admin\AppData\Roaming\TeamViewer\TeamViewer11_Logfile.log
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3076
      • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_x64.exe
        "C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_x64.exe" --action hooks --log C:\Users\Admin\AppData\Roaming\TeamViewer\TeamViewer11_Logfile.log
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4980
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TV_w32.dll
    Filesize

    244KB

    MD5

    f0b777f3f618d3e78a4662fa402f6574

    SHA1

    586b70aa32789c83e62cc961380bd06be272c2a3

    SHA256

    389b43f2c59fe2803cf4c6298b3a3de4e7cd06c7766396def4c68ea3e02ac5be

    SHA512

    09f9ad541943872c49c6cbb72a64ef512b8378b124d91792c311fed6d18e1ac254f270e91f476636fb15e1d5a1520eb08b7266e67a81ed975931833cda6aab6b

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TV_w32.exe
    Filesize

    243KB

    MD5

    cbc5267feaf535ab7700007ff102d519

    SHA1

    cae4811076375115c530953909dd06a75c028f56

    SHA256

    b39c3b0f0796e6d76d2836997c51f1a22279919879ac67083cca1a715fad556f

    SHA512

    ada777502132e5f72207c9cace01065b92e2277954bce2ec100c00f0cfbb0fe4a75145aaf1510b2f597f03ca2c8a6a773e7452d76e18b975a1c6c1ffdb099044

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TV_x64.dll
    Filesize

    267KB

    MD5

    d9da05b0c1ab8b2633d639ef9aadd178

    SHA1

    8d322ffd2360b77f8555914ef9f3e0021ffd34a5

    SHA256

    1eefccbfbe641f1a8c7260cd0336f5abda149e7e1bd675c82e3dc41edaf48bc6

    SHA512

    b82419f898b206e6a373d72a832b3b469ef03e34a6575eda4b858bd9a1761fd6556c9fdc77d74fb4e245244bbece9b268c5c9b726f54eba510512b94feddfc84

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TV_x64.exe
    Filesize

    280KB

    MD5

    f56e2755937d6f472fa5564046ce6593

    SHA1

    924870cb77fef1cdf4387a76ccb652cac2111e77

    SHA256

    4d792a7cb5f68c34a8a74eff62eeda8890a0b35802feed90986b14a428a72742

    SHA512

    6f22da085d92db06ead0dd260da5876f66663c53b301cec6de19fc60a86eff2032698b8a1870162b7fc77c33f254818237467101f6055e68c86d752386bd5d1d

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
    Filesize

    19.6MB

    MD5

    b621ed58101b0f1aeee30fc322173534

    SHA1

    c5bbf6c649ec6ad9c65ea99f3cd30f7ed290f85d

    SHA256

    e39b1a0076234303b272c9c0b03c59c5d85debf2f8538545baa592edfcc56775

    SHA512

    d00382e0a5badba9515bcdd42089998b06b5faf62f706c365dbed12af85c3fe64da8fb0c01d877fd7a7d2f2720ee77a5582f6691070dc3b9c2966a00058c2168

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer.exe
    Filesize

    19.6MB

    MD5

    b621ed58101b0f1aeee30fc322173534

    SHA1

    c5bbf6c649ec6ad9c65ea99f3cd30f7ed290f85d

    SHA256

    e39b1a0076234303b272c9c0b03c59c5d85debf2f8538545baa592edfcc56775

    SHA512

    d00382e0a5badba9515bcdd42089998b06b5faf62f706c365dbed12af85c3fe64da8fb0c01d877fd7a7d2f2720ee77a5582f6691070dc3b9c2966a00058c2168

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_Resource_de.dll
    Filesize

    651KB

    MD5

    c09fb5a02bdc1996b506d7ad9199be53

    SHA1

    cbfa1a81c88f0959825722243db125788914b371

    SHA256

    4863c11111a881ce65e56400d59b4533a7aefcac7dd6a8b1cb274ae00f385a9d

    SHA512

    27758c86f893a0138ffa380ea4c76fb667ba188976770f7f47028a1aa02800fcdc3b5635d570a951fe9c9fc82887d67fbe5a87c708e8daad3a50703def04bc5b

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_Resource_en.dll
    Filesize

    608KB

    MD5

    fffe5b32fd479e0c2ddd401a507fb306

    SHA1

    6332175cbfea7f3c9be2cb712925c00fc4b2ab17

    SHA256

    13f7276868b04eaed8ddc0d34f7385dbefbc0510cc2a921d52428e6ebafe4e97

    SHA512

    946cb5311e40acbb45330c115a66f7fe252c33b7945717e80c542464f97cbf725af5ede9dc0ff2a275493e8e92f1ac3efb3f3195c7481ad889fe5de6c4a3340f

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_StaticRes.dll
    Filesize

    1.1MB

    MD5

    201b5876256d908d56f4633863af2170

    SHA1

    a18da9e1745b93812d3039472a84238080754ebc

    SHA256

    e775034d55ca8b935749b47550784779da32d264a5596552aeba2af41e2e8fa3

    SHA512

    813a5845b9a1f3d0d0ca978ecf79ad6c9b71686efbef4ad49a501c098881244759991e94a2e03119e7a08288a630d3794fef7c046491535fb8e4e9dcf950906c

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_w32.dll
    Filesize

    244KB

    MD5

    f0b777f3f618d3e78a4662fa402f6574

    SHA1

    586b70aa32789c83e62cc961380bd06be272c2a3

    SHA256

    389b43f2c59fe2803cf4c6298b3a3de4e7cd06c7766396def4c68ea3e02ac5be

    SHA512

    09f9ad541943872c49c6cbb72a64ef512b8378b124d91792c311fed6d18e1ac254f270e91f476636fb15e1d5a1520eb08b7266e67a81ed975931833cda6aab6b

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_w32.dll
    Filesize

    244KB

    MD5

    f0b777f3f618d3e78a4662fa402f6574

    SHA1

    586b70aa32789c83e62cc961380bd06be272c2a3

    SHA256

    389b43f2c59fe2803cf4c6298b3a3de4e7cd06c7766396def4c68ea3e02ac5be

    SHA512

    09f9ad541943872c49c6cbb72a64ef512b8378b124d91792c311fed6d18e1ac254f270e91f476636fb15e1d5a1520eb08b7266e67a81ed975931833cda6aab6b

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_w32.exe
    Filesize

    243KB

    MD5

    cbc5267feaf535ab7700007ff102d519

    SHA1

    cae4811076375115c530953909dd06a75c028f56

    SHA256

    b39c3b0f0796e6d76d2836997c51f1a22279919879ac67083cca1a715fad556f

    SHA512

    ada777502132e5f72207c9cace01065b92e2277954bce2ec100c00f0cfbb0fe4a75145aaf1510b2f597f03ca2c8a6a773e7452d76e18b975a1c6c1ffdb099044

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_x64.dll
    Filesize

    267KB

    MD5

    d9da05b0c1ab8b2633d639ef9aadd178

    SHA1

    8d322ffd2360b77f8555914ef9f3e0021ffd34a5

    SHA256

    1eefccbfbe641f1a8c7260cd0336f5abda149e7e1bd675c82e3dc41edaf48bc6

    SHA512

    b82419f898b206e6a373d72a832b3b469ef03e34a6575eda4b858bd9a1761fd6556c9fdc77d74fb4e245244bbece9b268c5c9b726f54eba510512b94feddfc84

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tv_x64.exe
    Filesize

    280KB

    MD5

    f56e2755937d6f472fa5564046ce6593

    SHA1

    924870cb77fef1cdf4387a76ccb652cac2111e77

    SHA256

    4d792a7cb5f68c34a8a74eff62eeda8890a0b35802feed90986b14a428a72742

    SHA512

    6f22da085d92db06ead0dd260da5876f66663c53b301cec6de19fc60a86eff2032698b8a1870162b7fc77c33f254818237467101f6055e68c86d752386bd5d1d

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\tvinfo.ini
    Filesize

    47B

    MD5

    d357ba3fcd0e05c9741621260a38d444

    SHA1

    15d6694a3b4a9623c881213bd63cb2170aba6d90

    SHA256

    1611b9d0faafbc07636100279ab31ac3975309a6e0399fdfdc25fce66f8d573e

    SHA512

    55906eb2bb4d48b933274032f121ed93c97969ca8e5eda5bdf528bf8f6b38291d387a95d0c42c446e0256116909da532c3c8259ebffee896061125037a6a2419

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\System.dll
    Filesize

    11KB

    MD5

    0ff2d70cfdc8095ea99ca2dabbec3cd7

    SHA1

    10c51496d37cecd0e8a503a5a9bb2329d9b38116

    SHA256

    982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

    SHA512

    cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\TvGetVersion.dll
    Filesize

    210KB

    MD5

    05f51bc8ffb2c8f5a2825bf5680301cf

    SHA1

    30f7f77dce1fb3526142780e9f5bd5c11622d6b6

    SHA256

    c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e

    SHA512

    1e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\TvGetVersion.dll
    Filesize

    210KB

    MD5

    05f51bc8ffb2c8f5a2825bf5680301cf

    SHA1

    30f7f77dce1fb3526142780e9f5bd5c11622d6b6

    SHA256

    c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e

    SHA512

    1e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\TvGetVersion.dll
    Filesize

    210KB

    MD5

    05f51bc8ffb2c8f5a2825bf5680301cf

    SHA1

    30f7f77dce1fb3526142780e9f5bd5c11622d6b6

    SHA256

    c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e

    SHA512

    1e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\nsis7z.dll
    Filesize

    175KB

    MD5

    87853c0f20f065793bdc707ece66190b

    SHA1

    738e11a9a565923ec75400a0cd4bce4db257b21d

    SHA256

    66b2f36274ddfeef35b1d6ae6e5755f834446e5d78a719063347543793987161

    SHA512

    febfcd11795f4ef0ff3d25cbf1856be01e7f6423a9f16028c927988c04ab21de5f0b076d7f4ce9294aa7603c0db61ea5ffb888af2e9f7c6a6a11bcabfe9795a2

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\nsis7z.dll
    Filesize

    175KB

    MD5

    87853c0f20f065793bdc707ece66190b

    SHA1

    738e11a9a565923ec75400a0cd4bce4db257b21d

    SHA256

    66b2f36274ddfeef35b1d6ae6e5755f834446e5d78a719063347543793987161

    SHA512

    febfcd11795f4ef0ff3d25cbf1856be01e7f6423a9f16028c927988c04ab21de5f0b076d7f4ce9294aa7603c0db61ea5ffb888af2e9f7c6a6a11bcabfe9795a2

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\nsis7z.dll
    Filesize

    175KB

    MD5

    87853c0f20f065793bdc707ece66190b

    SHA1

    738e11a9a565923ec75400a0cd4bce4db257b21d

    SHA256

    66b2f36274ddfeef35b1d6ae6e5755f834446e5d78a719063347543793987161

    SHA512

    febfcd11795f4ef0ff3d25cbf1856be01e7f6423a9f16028c927988c04ab21de5f0b076d7f4ce9294aa7603c0db61ea5ffb888af2e9f7c6a6a11bcabfe9795a2

  • C:\Users\Admin\AppData\Local\Temp\nsj60E3.tmp\nsis7z.dll
    Filesize

    175KB

    MD5

    87853c0f20f065793bdc707ece66190b

    SHA1

    738e11a9a565923ec75400a0cd4bce4db257b21d

    SHA256

    66b2f36274ddfeef35b1d6ae6e5755f834446e5d78a719063347543793987161

    SHA512

    febfcd11795f4ef0ff3d25cbf1856be01e7f6423a9f16028c927988c04ab21de5f0b076d7f4ce9294aa7603c0db61ea5ffb888af2e9f7c6a6a11bcabfe9795a2

  • C:\Users\Admin\AppData\Roaming\TeamViewer\TeamViewer11_Logfile.log
    Filesize

    4KB

    MD5

    450cd1367576d33326e27a9e68728ed6

    SHA1

    54792871254c1cd64bc149b7e93e2f4cd0e4f75f

    SHA256

    c3a5f47751be0e4d9a8c0bbb1cb5a4142adb3660ffb7ce801e83b77ad104fa2e

    SHA512

    21cd5ae3152c474ac2066233674d9d5172be4104d67ccce58f450d54aae2a180c78ce3ba108c5579b4c82daa62433e93d7e9441b79d19c2fc109cec43c582f32

  • C:\Users\Admin\AppData\Roaming\TeamViewer\TeamViewer11_Logfile.log
    Filesize

    5KB

    MD5

    1789f28d6ec9f2487693dc17a553f4e0

    SHA1

    1bb125472e0d05502a2a041a942d41677cf6b154

    SHA256

    588476fbf1b5bfa338024b8515860086ae0ade59019046ffd80c2e3a94cb554f

    SHA512

    c2e65ed7ba76b5119c4150f2d172fa7b20dfafb68dc4436a77fedb087944c332023ab86dcb43dc6a070aedf97a6164d99632ec0817bdb3a76d7dde88614751e5

  • memory/1240-144-0x0000000000000000-mapping.dmp
  • memory/3076-156-0x0000000000000000-mapping.dmp
  • memory/4792-138-0x0000000002320000-0x0000000002352000-memory.dmp
    Filesize

    200KB

  • memory/4980-159-0x0000000000000000-mapping.dmp