Analysis

  • max time kernel
    86s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2023 15:22

General

  • Target

    05bcad0109788d76c1f9a199baad13c78352661dbf10c22dc99db2c9bdc216d0.exe

  • Size

    5.4MB

  • MD5

    d56a09aa4c061c9125c5871dd8ab19b2

  • SHA1

    dfe1a0fbe3f7ff7cdebc5b5e51e860b5ee60440f

  • SHA256

    05bcad0109788d76c1f9a199baad13c78352661dbf10c22dc99db2c9bdc216d0

  • SHA512

    674038097546434ffc5832962e0c05efdf6e1277cede6d5fb4ba44445dc72a85b7738b0f958b458d22beb8fe2f6fc6ad7c5aed182c56a1caabf908439e2283a0

  • SSDEEP

    98304:CEwQXyX2kHK5mi8P4+18frP3wbzWFimaI7dlZ:CE3XyXhHKQkgbzWFimaI7dl

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05bcad0109788d76c1f9a199baad13c78352661dbf10c22dc99db2c9bdc216d0.exe
    "C:\Users\Admin\AppData\Local\Temp\05bcad0109788d76c1f9a199baad13c78352661dbf10c22dc99db2c9bdc216d0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
      2⤵
        PID:1896

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Browser Extensions

    1
    T1176

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads