Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 10:16

General

  • Target

    New Business Plans For 2023.exe

  • Size

    288KB

  • MD5

    70edcda282f212e200de869a5259b54e

  • SHA1

    33c4a2f7b7da8a852c9ca88b37bcd2f26293f930

  • SHA256

    96063791795dc2a645f18624ed05896d1a5913c724e9b6f8caf9f59bad9ef954

  • SHA512

    ea72392cf71d49a93b952ae7d84aeb936ce3e8742744f891a6eadd8ee2c658eb7954b0384be13728fd3b43a23bc6012a769c25ff91f7eee81001913e044a2134

  • SSDEEP

    6144:vYa6KJRFNCNxlBhMrhtQ5m6gOue4B+HynWSIUGQB7Rw7uilgy:vY0TCXMrhtAJC+Sr9h27uil/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\New Business Plans For 2023.exe
      "C:\Users\Admin\AppData\Local\Temp\New Business Plans For 2023.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Users\Admin\AppData\Local\Temp\lgbcj.exe
        "C:\Users\Admin\AppData\Local\Temp\lgbcj.exe" C:\Users\Admin\AppData\Local\Temp\swkjfpqpbzf.s
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\Local\Temp\lgbcj.exe
          "C:\Users\Admin\AppData\Local\Temp\lgbcj.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1160
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1688
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1688 -s 148
            4⤵
            • Program crash
            PID:3948
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 476 -p 1688 -ip 1688
      1⤵
        PID:3704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\lgbcj.exe

        Filesize

        97KB

        MD5

        38a998957adfd7d7408b04219feca7c8

        SHA1

        ef7ae5257c7188b52c164253cec9ce55adb76288

        SHA256

        eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474

        SHA512

        33383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae

      • C:\Users\Admin\AppData\Local\Temp\lgbcj.exe

        Filesize

        97KB

        MD5

        38a998957adfd7d7408b04219feca7c8

        SHA1

        ef7ae5257c7188b52c164253cec9ce55adb76288

        SHA256

        eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474

        SHA512

        33383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae

      • C:\Users\Admin\AppData\Local\Temp\lgbcj.exe

        Filesize

        97KB

        MD5

        38a998957adfd7d7408b04219feca7c8

        SHA1

        ef7ae5257c7188b52c164253cec9ce55adb76288

        SHA256

        eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474

        SHA512

        33383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae

      • C:\Users\Admin\AppData\Local\Temp\pgcku.ei

        Filesize

        202KB

        MD5

        0088cf2da429e9fc128ad672cc0459d7

        SHA1

        c68453b91fc6dfa0a38b05ff611466e23a6cee80

        SHA256

        872f483c81321416c17bdafedc5005b347bf10ebc42cacd922e5a4f5df8f475a

        SHA512

        8d676907feeec1015f1cfa72f6f3afa2acecee9acb90383dbff8607f3265b27c9bb345a5fee298bc00b1778ae2ee69264768ae40bbfbc8fcd48084d415f0e442

      • C:\Users\Admin\AppData\Local\Temp\swkjfpqpbzf.s

        Filesize

        6KB

        MD5

        e8294c61e6c568acc405876ee731887a

        SHA1

        ca75ad2de0afe8cca29336bc1b4a7ff4859003c2

        SHA256

        d30fb337260de421fbdfd9ec4043a9762092c3e389efa83d1318cc0a8ecf86c0

        SHA512

        6e4f1dbcdbb19fef7e9931d94e77c142f9d1524dd5678dbd98d997d0bf9b45a245c7189e1c59a359cdcc4dd213c3bb070d03b68255c73c238f235447e053c76f

      • memory/640-153-0x0000000000A40000-0x0000000000A9A000-memory.dmp

        Filesize

        360KB

      • memory/640-158-0x0000000000C30000-0x0000000000CBF000-memory.dmp

        Filesize

        572KB

      • memory/640-156-0x0000000000180000-0x00000000001AC000-memory.dmp

        Filesize

        176KB

      • memory/640-155-0x0000000000E00000-0x000000000114A000-memory.dmp

        Filesize

        3.3MB

      • memory/640-154-0x0000000000180000-0x00000000001AC000-memory.dmp

        Filesize

        176KB

      • memory/640-151-0x0000000000A40000-0x0000000000A9A000-memory.dmp

        Filesize

        360KB

      • memory/748-167-0x00000000089B0000-0x0000000008A6F000-memory.dmp

        Filesize

        764KB

      • memory/748-150-0x0000000003280000-0x0000000003349000-memory.dmp

        Filesize

        804KB

      • memory/748-159-0x00000000089B0000-0x0000000008A6F000-memory.dmp

        Filesize

        764KB

      • memory/748-160-0x00000000089B0000-0x0000000008A6F000-memory.dmp

        Filesize

        764KB

      • memory/1160-142-0x00000000007A0000-0x00000000007CE000-memory.dmp

        Filesize

        184KB

      • memory/1160-149-0x0000000000810000-0x0000000000820000-memory.dmp

        Filesize

        64KB

      • memory/1160-148-0x0000000000FC0000-0x000000000130A000-memory.dmp

        Filesize

        3.3MB

      • memory/1160-147-0x00000000007A0000-0x00000000007CE000-memory.dmp

        Filesize

        184KB