Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2023, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
14 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
703KB
-
MD5
8c2c09dc31dc65ba060a203a8c632ec0
-
SHA1
7565471a2f1990efcfbf61dac83a52d4763edd4f
-
SHA256
adaa96068e4072db205354abc3394d59db0cc04248c7ed3022f95da4efa94438
-
SHA512
60d88e9707cbbb48b7786cd8624670c053aa143e2ce68383f03bc3ee6a79b9887c9eec99ec5975169b6b4ea012aa68591ffd6c2dcb343c73c49b9df837144dc3
-
SSDEEP
12288:QTJs2D9qDSulQBE32WATB6qA9hB4miERS26PAVSOZLXk5mA4NK:cJTD9qDSul/3DCA9F6P+Zjk5+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4832 set thread context of 1816 4832 tmp.exe 93 PID 1816 set thread context of 3136 1816 tmp.exe 40 PID 3796 set thread context of 3136 3796 cscript.exe 40 -
Program crash 1 IoCs
pid pid_target Process procid_target 4496 3548 WerFault.exe 96 -
description ioc Process Key created \Registry\User\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1816 tmp.exe 1816 tmp.exe 1816 tmp.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe 3796 cscript.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1816 tmp.exe Token: SeDebugPrivilege 3796 cscript.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 4832 wrote to memory of 1816 4832 tmp.exe 93 PID 3136 wrote to memory of 3796 3136 Explorer.EXE 94 PID 3136 wrote to memory of 3796 3136 Explorer.EXE 94 PID 3136 wrote to memory of 3796 3136 Explorer.EXE 94 PID 3796 wrote to memory of 3548 3796 cscript.exe 96 PID 3796 wrote to memory of 3548 3796 cscript.exe 96 PID 3796 wrote to memory of 3548 3796 cscript.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3548
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3548 -s 1284⤵
- Program crash
PID:4496
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 3548 -ip 35481⤵PID:5116