Analysis
-
max time kernel
37s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Toolkit.exe
Resource
win7-20230220-en
General
-
Target
Microsoft Toolkit.exe
-
Size
1.1MB
-
MD5
371736712388ceda55cd2175282bfc86
-
SHA1
36ae0978ff85f892dfe1cc5a2af5bc3c93b1dfed
-
SHA256
234285bf25600383d245973a6567e7c2acdb125c6471eb377842503fd25239fe
-
SHA512
871bd5eae3813c1b4ed7d065d58a394dd8d2d24a835d07dbc1780d57a1a78ac9ca6e839393e7fec69ceffc0e53e3ee3c88e5f23801c0f5aac23288bf4454c50c
-
SSDEEP
24576:WxG3B/YkCWHVyvK6TqFfx/2tDw/F8WehDPQNv+J:72kCW1m/G/2t0uTFA+J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1252 Microsoft Toolkit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26 PID 1252 wrote to memory of 1684 1252 Microsoft Toolkit.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Toolkit.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Toolkit.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\a2GOkxzZEj\oHz5OXzP\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2GOkxzZEj\oHz5OXzP\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5371736712388ceda55cd2175282bfc86
SHA136ae0978ff85f892dfe1cc5a2af5bc3c93b1dfed
SHA256234285bf25600383d245973a6567e7c2acdb125c6471eb377842503fd25239fe
SHA512871bd5eae3813c1b4ed7d065d58a394dd8d2d24a835d07dbc1780d57a1a78ac9ca6e839393e7fec69ceffc0e53e3ee3c88e5f23801c0f5aac23288bf4454c50c
-
Filesize
1.1MB
MD5371736712388ceda55cd2175282bfc86
SHA136ae0978ff85f892dfe1cc5a2af5bc3c93b1dfed
SHA256234285bf25600383d245973a6567e7c2acdb125c6471eb377842503fd25239fe
SHA512871bd5eae3813c1b4ed7d065d58a394dd8d2d24a835d07dbc1780d57a1a78ac9ca6e839393e7fec69ceffc0e53e3ee3c88e5f23801c0f5aac23288bf4454c50c
-
Filesize
1.1MB
MD5371736712388ceda55cd2175282bfc86
SHA136ae0978ff85f892dfe1cc5a2af5bc3c93b1dfed
SHA256234285bf25600383d245973a6567e7c2acdb125c6471eb377842503fd25239fe
SHA512871bd5eae3813c1b4ed7d065d58a394dd8d2d24a835d07dbc1780d57a1a78ac9ca6e839393e7fec69ceffc0e53e3ee3c88e5f23801c0f5aac23288bf4454c50c