Analysis
-
max time kernel
95s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2023 12:50
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20230220-en
Errors
General
-
Target
Payload.exe
-
Size
27KB
-
MD5
b4dad0a0467d3a0c9621ca1c7794c707
-
SHA1
61800bf88b4878d44f7accc79860c4aee482e5cb
-
SHA256
7c2a477d02ba0822602b27a761edf1a8370d595e487fa0351e42d0765844561e
-
SHA512
6d2880136ff05b51025cc345daf1f1b23ec5d04a0b7809b306dfd93fab4664335b832b6f4060db44b59a3c410213d4da133d56aaf588f22bd164187a7a9f1a65
-
SSDEEP
384:vLbmd21qBNOaLNOF0TEdQIeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhca/:Dyd2u0cqKl7A/vMHTi9bD
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
Payload.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
OpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
Payload.exedescription pid process Token: SeDebugPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe Token: 33 932 Payload.exe Token: SeIncBasePriorityPrivilege 932 Payload.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4916 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\InstallEdit.vbe"1⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 MicrosoftWindows.Client.CBS_cw5n1h2txyewy1⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39a7055 /state1:0x41c64e6d1⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy1⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 MicrosoftWindows.Client.CBS_cw5n1h2txyewy1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/528-190-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-181-0x000001DA306F0000-0x000001DA306F1000-memory.dmpFilesize
4KB
-
memory/528-141-0x000001DA28270000-0x000001DA28280000-memory.dmpFilesize
64KB
-
memory/528-206-0x000001DA30780000-0x000001DA30781000-memory.dmpFilesize
4KB
-
memory/528-176-0x000001DA305A0000-0x000001DA305A1000-memory.dmpFilesize
4KB
-
memory/528-178-0x000001DA306E0000-0x000001DA306E1000-memory.dmpFilesize
4KB
-
memory/528-180-0x000001DA306E0000-0x000001DA306E1000-memory.dmpFilesize
4KB
-
memory/528-191-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-182-0x000001DA306F0000-0x000001DA306F1000-memory.dmpFilesize
4KB
-
memory/528-183-0x000001DA306F0000-0x000001DA306F1000-memory.dmpFilesize
4KB
-
memory/528-184-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-185-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-186-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-192-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-188-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-189-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-157-0x000001DA28370000-0x000001DA28380000-memory.dmpFilesize
64KB
-
memory/528-205-0x000001DA30780000-0x000001DA30781000-memory.dmpFilesize
4KB
-
memory/528-187-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-193-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-194-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-195-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-196-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-197-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-198-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-199-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-200-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-201-0x000001DA30710000-0x000001DA30711000-memory.dmpFilesize
4KB
-
memory/528-202-0x000001DA30720000-0x000001DA30721000-memory.dmpFilesize
4KB
-
memory/528-203-0x000001DA30720000-0x000001DA30721000-memory.dmpFilesize
4KB
-
memory/528-204-0x000001DA30730000-0x000001DA30731000-memory.dmpFilesize
4KB
-
memory/932-136-0x0000000001580000-0x0000000001590000-memory.dmpFilesize
64KB
-
memory/932-133-0x0000000001580000-0x0000000001590000-memory.dmpFilesize
64KB