Analysis

  • max time kernel
    35s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 16:42

General

  • Target

    7d8e4f6c49c0d7646075802484be99ec.exe

  • Size

    372KB

  • MD5

    7d8e4f6c49c0d7646075802484be99ec

  • SHA1

    2bba7a745133c7766f402274cd893233d860adaa

  • SHA256

    6da538f334fe6439a1915d69489fcce17a2f23be109e4dbb5820481d1a45a780

  • SHA512

    bf7e32aa2df7b8b2e6a8fe5101619feb4ea694f82e8a4f1dc54dc96b75d01b3e84dacd0c3a45d8c99bf827c06b139001061acf163814415ab2f7a6aa94cc444d

  • SSDEEP

    6144:4C9n5C4GloiqpNoc8bb+SGPi09J4K4VZeDcAPJic9Uem:4C9n5C4fXp+c8bbsfAPVUZJic9zm

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d8e4f6c49c0d7646075802484be99ec.exe
    "C:\Users\Admin\AppData\Local\Temp\7d8e4f6c49c0d7646075802484be99ec.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Windows\SysWOW64\takeown.exe
      C:\Windows\System32\takeown.exe
      2⤵
      • Deletes itself
      • Modifies file permissions
      • Checks processor information in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\SysWOW64\help.exe
        C:\Windows\System32\help.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Windows\SysWOW64\ftp.exe
          C:\Windows\System32\ftp.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 1308
        3⤵
        • Program crash
        PID:1280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1140 -ip 1140
    1⤵
      PID:2372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\eypn1lcs.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\DWWIN.EXE

      Filesize

      372KB

      MD5

      7d8e4f6c49c0d7646075802484be99ec

      SHA1

      2bba7a745133c7766f402274cd893233d860adaa

      SHA256

      6da538f334fe6439a1915d69489fcce17a2f23be109e4dbb5820481d1a45a780

      SHA512

      bf7e32aa2df7b8b2e6a8fe5101619feb4ea694f82e8a4f1dc54dc96b75d01b3e84dacd0c3a45d8c99bf827c06b139001061acf163814415ab2f7a6aa94cc444d

    • memory/568-1-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/568-2-0x0000000002270000-0x00000000022B9000-memory.dmp

      Filesize

      292KB

    • memory/568-3-0x0000000002270000-0x00000000022B9000-memory.dmp

      Filesize

      292KB

    • memory/568-6-0x0000000002270000-0x00000000022B9000-memory.dmp

      Filesize

      292KB

    • memory/568-9-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/568-10-0x0000000002270000-0x00000000022B9000-memory.dmp

      Filesize

      292KB

    • memory/568-0-0x0000000000470000-0x0000000000473000-memory.dmp

      Filesize

      12KB

    • memory/1140-24-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1140-52-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-19-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1140-20-0x00000000778D0000-0x0000000077933000-memory.dmp

      Filesize

      396KB

    • memory/1140-23-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1140-15-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-27-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-29-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-32-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-33-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-30-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-37-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-36-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-35-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-26-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-25-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-12-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1140-16-0x0000000000DB0000-0x0000000000DF9000-memory.dmp

      Filesize

      292KB

    • memory/1760-77-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1760-79-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-92-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-91-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-65-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-76-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1760-78-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-81-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-68-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-69-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-73-0x00000000778D0000-0x0000000077933000-memory.dmp

      Filesize

      396KB

    • memory/1760-72-0x00000000760B0000-0x00000000762C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1760-64-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-80-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-82-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/1760-84-0x0000000001020000-0x0000000001069000-memory.dmp

      Filesize

      292KB

    • memory/3932-44-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-39-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-46-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-48-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-51-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-38-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-90-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-42-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB

    • memory/3932-45-0x0000000000E70000-0x0000000000EB9000-memory.dmp

      Filesize

      292KB