Analysis

  • max time kernel
    95s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-04-2023 12:50

Errors

Reason
Machine shutdown

General

  • Target

    Payload.exe

  • Size

    27KB

  • MD5

    b4dad0a0467d3a0c9621ca1c7794c707

  • SHA1

    61800bf88b4878d44f7accc79860c4aee482e5cb

  • SHA256

    7c2a477d02ba0822602b27a761edf1a8370d595e487fa0351e42d0765844561e

  • SHA512

    6d2880136ff05b51025cc345daf1f1b23ec5d04a0b7809b306dfd93fab4664335b832b6f4060db44b59a3c410213d4da133d56aaf588f22bd164187a7a9f1a65

  • SSDEEP

    384:vLbmd21qBNOaLNOF0TEdQIeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhca/:Dyd2u0cqKl7A/vMHTi9bD

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payload.exe
    "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:932
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4916
  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\InstallEdit.vbe"
    1⤵
      PID:4964
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 MicrosoftWindows.Client.CBS_cw5n1h2txyewy
      1⤵
        PID:3232
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
        1⤵
          PID:3100
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
            PID:528
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa39a7055 /state1:0x41c64e6d
            1⤵
              PID:3620
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
              1⤵
                PID:1972
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 MicrosoftWindows.Client.CBS_cw5n1h2txyewy
                1⤵
                  PID:824

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Credential Access

                Credentials in Files

                1
                T1081

                Discovery

                System Information Discovery

                1
                T1082

                Collection

                Data from Local System

                1
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/528-190-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-181-0x000001DA306F0000-0x000001DA306F1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-141-0x000001DA28270000-0x000001DA28280000-memory.dmp
                  Filesize

                  64KB

                • memory/528-206-0x000001DA30780000-0x000001DA30781000-memory.dmp
                  Filesize

                  4KB

                • memory/528-176-0x000001DA305A0000-0x000001DA305A1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-178-0x000001DA306E0000-0x000001DA306E1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-180-0x000001DA306E0000-0x000001DA306E1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-191-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-182-0x000001DA306F0000-0x000001DA306F1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-183-0x000001DA306F0000-0x000001DA306F1000-memory.dmp
                  Filesize

                  4KB

                • memory/528-184-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-185-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-186-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-192-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-188-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-189-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-157-0x000001DA28370000-0x000001DA28380000-memory.dmp
                  Filesize

                  64KB

                • memory/528-205-0x000001DA30780000-0x000001DA30781000-memory.dmp
                  Filesize

                  4KB

                • memory/528-187-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-193-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-194-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-195-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-196-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-197-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-198-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-199-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-200-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-201-0x000001DA30710000-0x000001DA30711000-memory.dmp
                  Filesize

                  4KB

                • memory/528-202-0x000001DA30720000-0x000001DA30721000-memory.dmp
                  Filesize

                  4KB

                • memory/528-203-0x000001DA30720000-0x000001DA30721000-memory.dmp
                  Filesize

                  4KB

                • memory/528-204-0x000001DA30730000-0x000001DA30731000-memory.dmp
                  Filesize

                  4KB

                • memory/932-136-0x0000000001580000-0x0000000001590000-memory.dmp
                  Filesize

                  64KB

                • memory/932-133-0x0000000001580000-0x0000000001590000-memory.dmp
                  Filesize

                  64KB