Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 12:02

General

  • Target

    6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe

  • Size

    253KB

  • MD5

    6ce5afac5ba2fe2015d5bf0e3d8c9f93

  • SHA1

    885c8b2a08cc32ed2943928f9cbbe481d71b0d82

  • SHA256

    44ee1342f0017083995ffaff831d09e459932a0a3c911c06e62a68ffe84db884

  • SHA512

    7657d60299f2e6d71dd9040df8422f3aa854b3abe090129bea7d8040e9ae3683342b06e679c90815591fafcfca943f0df223cc8b50064a07721eadefd1d59abc

  • SSDEEP

    6144:SY94Narf098CKA+PwBy6cSz0fg/mOqKqhrIMu/3:R9OaT0981Jl1fgOdKQg3

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
    "C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1008
      • C:\Windows\SysWOW64\key.exe
        C:\Windows\system32\key.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
          "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank
          4⤵
            PID:4424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe

      Filesize

      28KB

      MD5

      08ca19d445eecb4a4f2e01ef3dbbf936

      SHA1

      1660d70693ab06ab9cf10d193300f3a8daa2e05e

      SHA256

      95223cc4c108fc7dd3289c8bb420219403cdb2c37a13397f9badde4163aa42ad

      SHA512

      db7c1a4c8317df071a9e1f3507a1a349fc97298e2dc56e020059466f52e56ddc057e352e21ae2336a1519d3eeb4b73524061770b3e968d33ea2092f850becffa

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

      Filesize

      996B

      MD5

      75293f36b29713ddf9e491575cd9ba3c

      SHA1

      d44ecf7167e4680979afd372181d5ef948d07214

      SHA256

      7d0bc3f71c5b3e1ccf0d7ad31c6f47c09c77ff909b32ca414f5ab155f11a89fd

      SHA512

      d494fba249f9f9715c314188f346427c8fa93b5807b4076a1bb7602e759e5161ec9ba5bea69175b0a6688cf3f9905deff6455ba007e53917ac7f4efefc3f6e4f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\key.exe

      Filesize

      428KB

      MD5

      cafba206e1d7bcf25e7642226010a80a

      SHA1

      5af40cecd3c0f93068cbfdbca3bccabd1fea5def

      SHA256

      2f5de67fb28c657cf352db7f1cb714b6ab97586d8a86b59e56509819754d0168

      SHA512

      7407df747ea11f003ebae273b699224a40b70297ceb21e58aa375505909a78e9a8b9555a3a4cfb1d462da3619dea384c096709df890c1796bfa2070364e1b0bc

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keyhk.dll

      Filesize

      24KB

      MD5

      01e4b6bbc6407336756588818c6f57e0

      SHA1

      3ef1fdd3e2a9e7dc492d73b0005f72ceffa9c101

      SHA256

      dae5493e60f8c8f1bf33276084d3b4207ab1d24ff66453de59e786249c4f0d00

      SHA512

      d715c0b4abe812fec73e78d3db985ed24515365d1d217a4df37f193120373f142afb3979dab66caa147285eaeddd6e15d569617274004b4e4932027f10f76762

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keywb.dll

      Filesize

      40KB

      MD5

      c8f8519eda854af35f03e56ef14aee6e

      SHA1

      dd5bd23b60b2c9f3e8d96ca1616d5d36ffaecb48

      SHA256

      254660543a306e520ebc2c3fd4bbbfda6775154417db8f5fc3a4cd45cb85faef

      SHA512

      ee77fb75a5a2f0f7bec34237466f63a81e8e4b972540fd6c49bf8a89e5cf6da92c23f605cebfd761f8d7a758c826e199f65fd4a9992122bf66936f08e31ee242

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

      Filesize

      4KB

      MD5

      b570d4fdfcd44eea5ff8564b6099286d

      SHA1

      9560ef5d473ed86653f969c37745865d28af2caf

      SHA256

      7165a1c89e0468756e2e37cf1539767e80bc2d26cf8a0d498aa56d32ac78d122

      SHA512

      e8fbd7ede0e5468f622f58b5ae47760a1138c991a2202da6b835169cb08550d9275b1f666b273a6f8cf95b6aee9f15405dc2e4e7fa579762a7c13554fe0605c5

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

      Filesize

      7KB

      MD5

      fbe4bab53f74d3049ef4b306d4cd8742

      SHA1

      6504b63908997a71a65997fa31eda4ae4de013e7

      SHA256

      446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

      SHA512

      d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

    • C:\Windows\SysWOW64\key.exe

      Filesize

      428KB

      MD5

      1112e89859a0f2b052d5eb1626e25664

      SHA1

      7864b86a7e0ac3fc28e898d06eefc829e8d3be02

      SHA256

      92ff08bfffa729b69d6e4e128ee2fa03a1c1f367b168213e907bd3f70d64cb61

      SHA512

      c45f365ade9829f07605e686d3998e24f39c7b73b97639412191d4fc0fda3bfa1a087669a9a8ba1eb859ff8135c80df730e4709594201cb531b2bc08ececcb9e

    • C:\Windows\SysWOW64\keyhk.dll

      Filesize

      24KB

      MD5

      7719e3244553dce7b70a9d1083e291dc

      SHA1

      d7147a052b19bb08356ba6dea5cc0e6486a0121d

      SHA256

      6c48b4fe62614ad35aab89b534310024770fbcaa669d50a462f4973feeee926f

      SHA512

      5ea1aad723e1043028136c943899e5a33e4b58b119c927fb001891facae656277969ec31cd7035680eb5d97e401c22577a082c2cf728e9142a3f0c62d1d99beb

    • C:\Windows\SysWOW64\keywb.dll

      Filesize

      40KB

      MD5

      21d4e01f38b5efd64ad6816fa0b44677

      SHA1

      5242d2c5b450c773b9fa3ad014a8aba9b7bb206a

      SHA256

      3285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977

      SHA512

      77dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8

    • C:\Windows\SysWOW64\pk.bin

      Filesize

      4KB

      MD5

      2a0ba30c92f6e112fe8fde81da9a8ff8

      SHA1

      2555d1c388a5493608b8325007ef7edd892cd5d6

      SHA256

      a0ec3bc34a0e4b53174985d314b4821bd28672a69535d19cefe84b961ee2cadd

      SHA512

      f6320876b1984644f90479ed80e76329ec920634abdaa40b56820900f692844dbe7610227d3524c13619c161186da363e8128b33e2bb58fbed05bb890fc4f566

    • memory/224-51-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB