Analysis

  • max time kernel
    175s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2023 00:49

General

  • Target

    rensenWare.exe

  • Size

    850KB

  • MD5

    a2c251b29f91a9f2dd103d1cf4d3f642

  • SHA1

    c756853b930edc2f105985f9ef67de67079c7c1b

  • SHA256

    08e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac

  • SHA512

    714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37

  • SSDEEP

    12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Kk8L0iw1j:BnsJ39LyjbJkQFMhmC+6GD9d8L0iu

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rensenWare.exe
    "C:\Users\Admin\AppData\Local\Temp\rensenWare.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 900
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:1316
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3780
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 904
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1736
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1604
    • C:\Users\Admin\Desktop\rensenWare.exe
      "C:\Users\Admin\Desktop\rensenWare.exe"
      1⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\Desktop\._cache_rensenWare.exe
        "C:\Users\Admin\Desktop\._cache_rensenWare.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 896
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4604
    • C:\Users\Admin\Desktop\rensenWare.exe
      "C:\Users\Admin\Desktop\rensenWare.exe"
      1⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Users\Admin\Desktop\._cache_rensenWare.exe
        "C:\Users\Admin\Desktop\._cache_rensenWare.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 876
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4468
    • C:\Users\Admin\Desktop\rensenWare.exe
      "C:\Users\Admin\Desktop\rensenWare.exe"
      1⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\Desktop\._cache_rensenWare.exe
        "C:\Users\Admin\Desktop\._cache_rensenWare.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 876
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
    • C:\Users\Admin\Desktop\rensenWare.exe
      "C:\Users\Admin\Desktop\rensenWare.exe"
      1⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Users\Admin\Desktop\._cache_rensenWare.exe
        "C:\Users\Admin\Desktop\._cache_rensenWare.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4204
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 908
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3188

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      850KB

      MD5

      a2c251b29f91a9f2dd103d1cf4d3f642

      SHA1

      c756853b930edc2f105985f9ef67de67079c7c1b

      SHA256

      08e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac

      SHA512

      714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      850KB

      MD5

      a2c251b29f91a9f2dd103d1cf4d3f642

      SHA1

      c756853b930edc2f105985f9ef67de67079c7c1b

      SHA256

      08e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac

      SHA512

      714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      850KB

      MD5

      a2c251b29f91a9f2dd103d1cf4d3f642

      SHA1

      c756853b930edc2f105985f9ef67de67079c7c1b

      SHA256

      08e7dbcdca0fc27b535eebf80d4e2d8b9c164885b9e9d767819b8030abcfbeac

      SHA512

      714ea3d43ed1910554f6e30d9a16c37f7b7469b81b0d278c0f92bf0c3e65109bcd917ca70fd029d4433ba6db717886d170ac16a73dc8c015ad48f54f53b30b37

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\AppData\Local\Temp\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • C:\Users\Admin\Desktop\._cache_rensenWare.exe

      Filesize

      96KB

      MD5

      f7ef31fef91a920ed709c13e7b4127ac

      SHA1

      29ab73cd907171d198787727f446118dd21365c3

      SHA256

      ef5a74f7b1eff376985795588d2d93876ea7417e946fac2e4da3555da8812d37

      SHA512

      a551a1a47240b54c1eb3d57ed117dfa222ed2bd5f3605ebf26091e548fcfb02d46fbd4bd4a9c1193200cc23b6ad67cf9f6343a58cd5f1164a7f52c53360d5760

    • memory/2104-467-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/2104-469-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3152-442-0x00000000013D0000-0x00000000013E0000-memory.dmp

      Filesize

      64KB

    • memory/3444-440-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3764-410-0x00000000018B0000-0x00000000018C0000-memory.dmp

      Filesize

      64KB

    • memory/3780-318-0x0000000000640000-0x0000000000641000-memory.dmp

      Filesize

      4KB

    • memory/3780-434-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3780-409-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3780-342-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3780-343-0x0000000000640000-0x0000000000641000-memory.dmp

      Filesize

      4KB

    • memory/3944-441-0x0000000002110000-0x0000000002111000-memory.dmp

      Filesize

      4KB

    • memory/3944-448-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/3988-319-0x0000000001780000-0x0000000001790000-memory.dmp

      Filesize

      64KB

    • memory/4204-474-0x00000000013C0000-0x00000000013D0000-memory.dmp

      Filesize

      64KB

    • memory/4348-263-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/4348-186-0x0000000002250000-0x0000000002251000-memory.dmp

      Filesize

      4KB

    • memory/4500-408-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/4500-397-0x0000000002110000-0x0000000002111000-memory.dmp

      Filesize

      4KB