Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 19:35

General

  • Target

    03a909dec05f764304e2916f1ad69c0146ce444c952b104e2262a8f107154a3e.exe

  • Size

    944KB

  • MD5

    b1f98612a2acb44b797cdc25d4a2d556

  • SHA1

    abcd0154adcd340528e923e625c7828911c36a01

  • SHA256

    03a909dec05f764304e2916f1ad69c0146ce444c952b104e2262a8f107154a3e

  • SHA512

    543e3444f1e9ed3e307aec297016488846580c5fad7d60b7180c8fcb3a4e5c628e34a424dce5652ccd5f5de68c20da8f084b710780897f34eba53c917537582c

  • SSDEEP

    12288:9bpdy+e/OgG4GfJMRo0dHvZjZLGFSGzBg8EtbQdRaMr+07HeZjZLnWmGzHg8546x:9epG4Gxuo0fZLGFNfkm+0CZLnWDKoZ

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03a909dec05f764304e2916f1ad69c0146ce444c952b104e2262a8f107154a3e.exe
    "C:\Users\Admin\AppData\Local\Temp\03a909dec05f764304e2916f1ad69c0146ce444c952b104e2262a8f107154a3e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha2068\ie\MediaViewerV1alpha2068.dll" /s
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha2068\ie\MediaViewerV1alpha2068.dll

    Filesize

    85KB

    MD5

    f795fe4cd14fde265b0631b61ce71d2a

    SHA1

    c2ea5f2385571cfd5f16238bc328869bf9312e14

    SHA256

    e31c8b4d8ef564d7c93b4c5c2fc39ef2c2bd5ff4123aa733931b33e5b274d07e

    SHA512

    ee50025d7a0413d072fc4f08cffc797edd996230ed07337c81d0968a102d9987f401903d04a84a947d073b6fba55dcc84802efc3a83d7866222ec0f16c3abde1

  • C:\Users\Admin\AppData\Local\Temp\nsj96E4.tmp\aminsis.dll

    Filesize

    834KB

    MD5

    14ad04243334645f399639b028f21d17

    SHA1

    7368866dc95621a1407d2105d040da2cc9852ba9

    SHA256

    02d13f28df1314640474ee77cd202a2c0da8e1d609c614f8fdff4451f8ee63fa

    SHA512

    3859b6f6e7e46ba70fa0be24fd2ceadf3db746818f11a09109c7bb678ee4fc08824a0cf15c77df09c3b2bdc2a80067a98130660152f5ee61e4bd501ef5ed1728