Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 22:16

General

  • Target

    54ba044589bc06d4537a8dd424996335.exe

  • Size

    28.5MB

  • MD5

    54ba044589bc06d4537a8dd424996335

  • SHA1

    a954c5ac77e291f4b769911c6cd6c0184c1e363b

  • SHA256

    c6562102e0d57d419f5b9aa9fe8e1d5d841d0d58cb51b13ad75beecc88ff6b02

  • SHA512

    67beb9499d82746bef5d63ba52794af64cd78fc577be6a4402a4b0a93b2bc4e5c25a09e2b28f21f8300e4473b63816260289ecdb2cef65f1dcf748e26e0d5a56

  • SSDEEP

    786432:aWbFwHtQ3VCpY4zN5stM7hENENdIKz2fWKudVMYz:b4PZUtM7qusfWKuvMW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54ba044589bc06d4537a8dd424996335.exe
    "C:\Users\Admin\AppData\Local\Temp\54ba044589bc06d4537a8dd424996335.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\is-J3P4U.tmp\54ba044589bc06d4537a8dd424996335.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-J3P4U.tmp\54ba044589bc06d4537a8dd424996335.tmp" /SL5="$70122,29385516,158720,C:\Users\Admin\AppData\Local\Temp\54ba044589bc06d4537a8dd424996335.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\ASCUpgrade.exe
        "C:\Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\ASCUpgrade.exe" /upgrade
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2980
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\BunndleOfferManager.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\BunndleOfferManager.dll

          Filesize

          176KB

          MD5

          d9ec085db470b704c686bf3fc6b35325

          SHA1

          84fe98349fee0009e5bbd03cddf1bc44e595e2f3

          SHA256

          2a3b1ec8469b4274b3af3569299b3af6b74ee6f66e778d295dab727a17e561e6

          SHA512

          6487e6b471a72015fc7bac9fe4210efd06aeac961c6ccb209428ee67a0bc16a4e60e23c35fcde2966edae17086b809e353c14fbd83ec62ac3a17a1a40f85151e

        • C:\Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\Inno_English.lng

          Filesize

          3KB

          MD5

          6b5b2adf93c30438b4085966c3d060c5

          SHA1

          e42b0463203d7ccc95c0520f83545e306dfe12e8

          SHA256

          5d804af00f37f7c715988559071e1bc8de7a7e5a2ef96414b42ab428d9404681

          SHA512

          fa1525697b049f8055430f1bcded28bd6dd6b141fe1414ff233866a9d86a3e3ca9dd4f9db8bb80c22fdb3f9f709b8ba69bd349a32f1f5edeeb3ba0b80382b513

        • \Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\ASCUpgrade.exe

          Filesize

          183KB

          MD5

          d4fe466fedd0ad740c43d5245be3229b

          SHA1

          546617e0970bc04e5dc366cc696c3a5b3f3fff96

          SHA256

          9d1d1bb699fdb3e3d690b9afba2dc2a3e1e810b30d46692e3de6d48073567816

          SHA512

          9a0a524567bf9e74a63575287ad9838c3cd832efe672a9e4c248e2606ab90d9da99a28da3ccf77e869540d578a600e5600b68d3fd1734e5930086a8f5979cd0d

        • \Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\BunndleOfferManager.dll

          Filesize

          192KB

          MD5

          054991f1e65fe4b6c594c1eefd7d4162

          SHA1

          a2b2191b929bc46b5c304c59c8a53f7fc42ee334

          SHA256

          4298741da48e1e7431cbe20ccc4f174a9c8d5d7edab1e4af2850a4d4bc5d8689

          SHA512

          803da64af3c358cdff67cd434e2c96a85a9775217ebaaefca81f14a3a167922c62691625d1f39ea0a5d81a07079604a903496de449d4824cb6617387ebe099e1

        • \Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\BunndleOfferManager.dll

          Filesize

          332KB

          MD5

          68b99a2553af69079ed90cf541bf23c4

          SHA1

          5492c10d1e26392c8fc905ceb54d71a5e06f2288

          SHA256

          267bf4af2c706a0312ec780299f3442589842e4077efde3edfbf280d15a1f09e

          SHA512

          e87ef110024d5a79116e99ec71547a28d4457d5815dc9753b9b3654519245fcc510adf221cac5a2e43d2c1d234a6538bd4f190c91eda9017e0674b4183868bdb

        • \Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\RdZone.dll

          Filesize

          166KB

          MD5

          0b9e41bb4792ec8c8ca68ebeb1438a26

          SHA1

          21b611690b3546c42187849fa7cf314dcac7d32f

          SHA256

          6d87ea98abc0d908924d0d024518229a6df6c63a52ce4111748ca3fc33896b16

          SHA512

          af1fa902dd0208a1d581474876811f69a0d481a0c22b038aa70e98ece56c3a076718aba5e2aa60f2b2b13b4fab0ebd23b36a9c3e8e2b8bcbda5e7b31296679ca

        • \Users\Admin\AppData\Local\Temp\is-6KPSO.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-J3P4U.tmp\54ba044589bc06d4537a8dd424996335.tmp

          Filesize

          1.1MB

          MD5

          6909a2f99ae429efc7f5c4a541511648

          SHA1

          1a311c6999f560e5bef6816ab20436792bcda87b

          SHA256

          9668cb304fef372321ac9c7db1a0145a8868044f4b2b7c899cc047673b26aeaa

          SHA512

          610d58e39af2d513bc4110fda115ea4dbd4bcc3d7faa91a72a789b674c54924f6285147fc7742ce9e6554bc312bb315f7e60903d3b17776ddeac5cea73f3ca88

        • memory/2736-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2736-28-0x0000000005850000-0x0000000005881000-memory.dmp

          Filesize

          196KB

        • memory/2736-39-0x0000000000400000-0x000000000052A000-memory.dmp

          Filesize

          1.2MB

        • memory/2736-40-0x0000000005850000-0x0000000005881000-memory.dmp

          Filesize

          196KB

        • memory/2736-44-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2736-68-0x0000000005850000-0x0000000005881000-memory.dmp

          Filesize

          196KB

        • memory/2904-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2904-2-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2904-38-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2980-23-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB