Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
11 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
832KB
-
MD5
953f34884877d4946480bb967d355f69
-
SHA1
e52f1dcdb3936c03649879acfa233950be04b1ac
-
SHA256
fbf4c7eb349a55d1ff19fa05bf33bbe8c0264177c2d3907c5a97cedc61aa804e
-
SHA512
a0b57553be2e55ddb07a7c527ddb67a2f080ce00ace7643292d2e4fd328536e64d0c367f95267666c5ab2371342e2bec8d5e6f685ba894351355250492a91a1b
-
SSDEEP
12288:FVQZwdnG0J27oEawEbRaNYBGutIm9RWNPfgLpttFHo0eZpsctZ+1Rkw4qsr3O:sZGnh/Ecz3Im9wP8tPoPwcC1DaO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4832 set thread context of 5092 4832 tmp.exe 107 PID 5092 set thread context of 2408 5092 tmp.exe 28 PID 484 set thread context of 2408 484 cmstp.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 3100 4416 WerFault.exe 109 -
description ioc Process Key created \Registry\User\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4832 tmp.exe 4832 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2408 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5092 tmp.exe 5092 tmp.exe 5092 tmp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe 484 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4832 tmp.exe Token: SeDebugPrivilege 5092 tmp.exe Token: SeDebugPrivilege 484 cmstp.exe Token: SeShutdownPrivilege 2408 Explorer.EXE Token: SeCreatePagefilePrivilege 2408 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4524 4832 tmp.exe 106 PID 4832 wrote to memory of 4524 4832 tmp.exe 106 PID 4832 wrote to memory of 4524 4832 tmp.exe 106 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 4832 wrote to memory of 5092 4832 tmp.exe 107 PID 2408 wrote to memory of 484 2408 Explorer.EXE 108 PID 2408 wrote to memory of 484 2408 Explorer.EXE 108 PID 2408 wrote to memory of 484 2408 Explorer.EXE 108 PID 484 wrote to memory of 4416 484 cmstp.exe 109 PID 484 wrote to memory of 4416 484 cmstp.exe 109 PID 484 wrote to memory of 4416 484 cmstp.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4416
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4416 -s 1484⤵
- Program crash
PID:3100
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 4416 -ip 44161⤵PID:3760