Analysis

  • max time kernel
    159s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2023, 16:02

General

  • Target

    @Asadawxas_easy.exe

  • Size

    10.0MB

  • MD5

    540fb39ad6a55e63953302a43c1f4f61

  • SHA1

    1460e999901c37ad4206fc1023534b0d7665849d

  • SHA256

    a8ca253df8182fa140f7779f68a2b89518c926f3e5dc88254bb91b68a053a1b9

  • SHA512

    fde9cfbc23c1e6aee6cca7fecd57644473e6f9aaf4540b789affe4feafb4afdafad3dfb3932281697d45952ebdf8d3270194ced14dbed0cff037abc13dc18ac0

  • SSDEEP

    24576:lhuq0PPl5CrpJU6OgeCLpQW8LVblcHYmcB:vuqaPjCrXU6Or4FeVbuHYmcB

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
    "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3532
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:880
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:684
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4332
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3972
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1116
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4884
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1668
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3792
    • C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe
      "C:\Users\Admin\AppData\Local\Temp\@Asadawxas_easy.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Applaunch.exe.log

      Filesize

      2KB

      MD5

      e20827dcc6e6a2ac0025d1365a016d09

      SHA1

      bf37a03da374a287748772162208b339e58c5979

      SHA256

      40276a0ae083727fbeca130bf3cd9e37c285e367cd0aa53b4d6cd5e8c073a1b0

      SHA512

      10ecb09ec766f9155e216aad96f2c094b306d17ade6cad2841569bd2d14f5d36b9ecaffdef6e1478ebd9071bb117d501ddd92108cd5ce525e67b29866a837ab9

    • memory/684-166-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/684-156-0x0000000002130000-0x0000000002158000-memory.dmp

      Filesize

      160KB

    • memory/684-157-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/684-162-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/684-163-0x00000000077A0000-0x00000000077B0000-memory.dmp

      Filesize

      64KB

    • memory/684-165-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1116-180-0x0000000007840000-0x0000000007850000-memory.dmp

      Filesize

      64KB

    • memory/1116-174-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1116-175-0x0000000000780000-0x00000000007A8000-memory.dmp

      Filesize

      160KB

    • memory/1116-179-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/1116-192-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1116-193-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/1668-203-0x0000000007820000-0x0000000007830000-memory.dmp

      Filesize

      64KB

    • memory/1668-206-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1668-205-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/1668-201-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/1668-195-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2832-226-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/2832-218-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2832-217-0x00000000007A0000-0x00000000007C8000-memory.dmp

      Filesize

      160KB

    • memory/2832-222-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/2832-223-0x0000000007830000-0x0000000007840000-memory.dmp

      Filesize

      64KB

    • memory/2832-225-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3532-141-0x0000000007710000-0x000000000781A000-memory.dmp

      Filesize

      1.0MB

    • memory/3532-133-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3532-143-0x0000000007820000-0x000000000785C000-memory.dmp

      Filesize

      240KB

    • memory/3532-144-0x0000000007A40000-0x0000000007AA6000-memory.dmp

      Filesize

      408KB

    • memory/3532-145-0x0000000007F90000-0x0000000008534000-memory.dmp

      Filesize

      5.6MB

    • memory/3532-142-0x0000000007960000-0x0000000007970000-memory.dmp

      Filesize

      64KB

    • memory/3532-151-0x0000000008F90000-0x0000000008FAE000-memory.dmp

      Filesize

      120KB

    • memory/3532-140-0x00000000076F0000-0x0000000007702000-memory.dmp

      Filesize

      72KB

    • memory/3532-139-0x0000000007060000-0x0000000007678000-memory.dmp

      Filesize

      6.1MB

    • memory/3532-146-0x0000000008570000-0x0000000008602000-memory.dmp

      Filesize

      584KB

    • memory/3532-147-0x0000000008620000-0x0000000008670000-memory.dmp

      Filesize

      320KB

    • memory/3532-148-0x00000000086A0000-0x0000000008716000-memory.dmp

      Filesize

      472KB

    • memory/3532-154-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3532-134-0x0000000002260000-0x0000000002288000-memory.dmp

      Filesize

      160KB

    • memory/3532-155-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/3532-138-0x00000000749F0000-0x00000000751A0000-memory.dmp

      Filesize

      7.7MB

    • memory/3532-150-0x0000000008960000-0x0000000008E8C000-memory.dmp

      Filesize

      5.2MB

    • memory/3532-149-0x0000000008780000-0x0000000008942000-memory.dmp

      Filesize

      1.8MB

    • memory/3792-212-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/3792-207-0x00000000006A0000-0x00000000006C8000-memory.dmp

      Filesize

      160KB

    • memory/3792-213-0x0000000007810000-0x0000000007820000-memory.dmp

      Filesize

      64KB

    • memory/3792-215-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3792-216-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/3792-208-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3972-167-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3972-183-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/3972-182-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/3972-173-0x0000000007900000-0x0000000007910000-memory.dmp

      Filesize

      64KB

    • memory/3972-172-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/3972-168-0x0000000002120000-0x0000000002148000-memory.dmp

      Filesize

      160KB

    • memory/4884-200-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/4884-202-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/4884-190-0x00000000077C0000-0x00000000077D0000-memory.dmp

      Filesize

      64KB

    • memory/4884-189-0x0000000074A90000-0x0000000075240000-memory.dmp

      Filesize

      7.7MB

    • memory/4884-185-0x0000000000790000-0x00000000007B8000-memory.dmp

      Filesize

      160KB

    • memory/4884-184-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB