Analysis

  • max time kernel
    74s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 13:26

General

  • Target

    52a70a809294561f69bb7016818e295779d8e00c797097cf77d534ed3a07dd2c.exe

  • Size

    7.5MB

  • MD5

    d32cd492ab44503128b89ba0ae6778cb

  • SHA1

    78c4d59a96f7e025fa7ebe80030fd9bb4547d21a

  • SHA256

    52a70a809294561f69bb7016818e295779d8e00c797097cf77d534ed3a07dd2c

  • SHA512

    028b44c1eea7142e8f50d17d3de28030255689ff53cc4ef9dc505fb6feef649edbb1a59e8796ce84222e94d370b7ddc9d1aee3baff946e4862529d310641f64e

  • SSDEEP

    196608:utjk/L5eZGBmm5t+fYOBaBMVrLWD+o88Vl:qxGBpIf9jVWD+o8sl

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52a70a809294561f69bb7016818e295779d8e00c797097cf77d534ed3a07dd2c.exe
    "C:\Users\Admin\AppData\Local\Temp\52a70a809294561f69bb7016818e295779d8e00c797097cf77d534ed3a07dd2c.exe"
    1⤵
    • Maps connected drives based on registry
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\52a70a809294561f69bb7016818e295779d8e00c797097cf77d534ed3a07dd2c.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\timeout.exe
        timeout -t 5
        3⤵
        • Delays execution with timeout.exe
        PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4EF2.tmp
    Filesize

    32B

    MD5

    3b33d980229e76222b961d17fd5aa43d

    SHA1

    43a761a68478e66db8f1dbce4b7a56ff2ce4fd20

    SHA256

    bd6e8000665e82408208cdf1fcc74a925c13c5a6492c252ca0153ce19f4141d3

    SHA512

    8e4e22744ed0e62a86d2df15df709b1498beea7359b64ac086679ef0fbceacd94ab9fca452b1234bbef17a87f5c6200104e84b934b8ed4bad3b1d26c68b5729d

  • C:\Users\Admin\AppData\Local\Temp\4FA1.tmp
    Filesize

    71KB

    MD5

    6a3c2fe239e67cd5804a699b9aa54b07

    SHA1

    018091f0c903173dec18cd10e0e00889f0717d67

    SHA256

    160b3bbb5a6845c2bc01355921c466e8b3ecc05de44888e5a4b27962898d7168

    SHA512

    aaf0f6171b6e4f6b143369a074357bac219e7efa56b6bee77988baa9264d76231b0c3df6922d2b2c95a1acf9901b81bcc76f783284fc5be02a789199d4dcbe37

  • memory/1056-65-0x0000000000100000-0x0000000000101000-memory.dmp
    Filesize

    4KB

  • memory/1056-67-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/1056-58-0x00000000000E0000-0x00000000000E1000-memory.dmp
    Filesize

    4KB

  • memory/1056-59-0x00000000000E0000-0x00000000000E1000-memory.dmp
    Filesize

    4KB

  • memory/1056-60-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/1056-61-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/1056-62-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/1056-64-0x0000000000100000-0x0000000000101000-memory.dmp
    Filesize

    4KB

  • memory/1056-54-0x0000000000090000-0x0000000000091000-memory.dmp
    Filesize

    4KB

  • memory/1056-57-0x00000000000E0000-0x00000000000E1000-memory.dmp
    Filesize

    4KB

  • memory/1056-68-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/1056-70-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB

  • memory/1056-71-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB

  • memory/1056-73-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/1056-74-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/1056-75-0x0000000000920000-0x0000000001555000-memory.dmp
    Filesize

    12.2MB

  • memory/1056-56-0x0000000000090000-0x0000000000091000-memory.dmp
    Filesize

    4KB

  • memory/1056-55-0x0000000000090000-0x0000000000091000-memory.dmp
    Filesize

    4KB