Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 16:23

General

  • Target

    91fbdf764109184d71a2848d11ab45ef67295d04737bd17b0c16924f2e1244cd.exe

  • Size

    650KB

  • MD5

    89a4688501be6b470f2837a414f214d9

  • SHA1

    2af62ce2d39cdfc1624a1a8cddc52e1fb70f8ba3

  • SHA256

    91fbdf764109184d71a2848d11ab45ef67295d04737bd17b0c16924f2e1244cd

  • SHA512

    ca6f470bc264769d3288cef7962bd06170e099d6d7bfcf15239e71a4a668afefab9d6234c8f7493f2ac46c80ff862c5886829fb8a3e9a78ce5a5c74bb330e72b

  • SSDEEP

    12288:pC6wyk1nvfBP0FQoOd/566f81qjbravk7o3xLWAB8TMfo+aqwFtaif8dHOqPNspy:pC6wp1vfhboOb66Uyavk8hdo+g8BOON3

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91fbdf764109184d71a2848d11ab45ef67295d04737bd17b0c16924f2e1244cd.exe
    "C:\Users\Admin\AppData\Local\Temp\91fbdf764109184d71a2848d11ab45ef67295d04737bd17b0c16924f2e1244cd.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 3100
      2⤵
      • Program crash
      PID:1268
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4792 -ip 4792
    1⤵
      PID:3604

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\CLDOB2BF\www.msn[1].xml

            Filesize

            146B

            MD5

            4205eff7f50778f2f5d71d7f59b0c181

            SHA1

            18d4c79c421f0ada970eab08ed8ded3c6b6c9110

            SHA256

            0b23c33afe7bd0c436c7675d107d7831851a2f24ab1f803959811c496d58bf0a

            SHA512

            c11b7553c5dcc55c796b6b505d302e63a71ad9c11c281197f7fe456a77de242a348dbc0f5cf8a12c46a8b180256fd89720ff37f121b34ed41e433262a3350d6e

          • memory/4792-0-0x0000000000400000-0x00000000005AC000-memory.dmp

            Filesize

            1.7MB

          • memory/4792-2-0x000000006F040000-0x000000006F050000-memory.dmp

            Filesize

            64KB

          • memory/4792-45-0x0000000000400000-0x00000000005AC000-memory.dmp

            Filesize

            1.7MB