Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 19:08

General

  • Target

    Terabysoftaller.exe

  • Size

    1.2MB

  • MD5

    5757869619f9fb2dcf0b5dd948e6786d

  • SHA1

    c3e95cc715d70b21f0c395c87d06e0667e076b0e

  • SHA256

    1df6e1411a40905896507f975eb6c663f2943c984451ac29cc8969e521a4dc8e

  • SHA512

    c6140885bbc43ac6c60c70976458e6282a8d84f8ecedac0cec6808c80a42f40b4f1930c3868081a5b8984c3c3e23fc925ab4ec9a2e43a2b4e946ecfcfc0436b8

  • SSDEEP

    24576:Z5xolYQY6qRmJkcoQricOIQxiZY1iakDHoFkFLYaT3rbvEB:cY8JZoQrbTFZY1ia+H1FNDrDEB

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Terabysoftaller.exe
    "C:\Users\Admin\AppData\Local\Temp\Terabysoftaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • \??\c:\users\admin\appdata\local\temp\terabysoftaller.exe 
      c:\users\admin\appdata\local\temp\terabysoftaller.exe 
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa C:\Users\Admin\AppData\Local\Temp\64.cab /quiet /extract:C:\Windows\system32\migwiz\ & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\system32\wusa.exe
          wusa C:\Users\Admin\AppData\Local\Temp\64.cab /quiet /extract:C:\Windows\system32\migwiz\
          4⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:2404
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\888.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\System32\migwiz\migwiz.exe
          "C:\Windows\System32\migwiz\migwiz.exe" C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2136
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1208
            • C:\Windows\System32\reg.exe
              C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • UAC bypass
              • Modifies registry key
              PID:2472
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2660
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2604
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2400
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2384
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2796
            • C:\Windows\SysWOW64\at.exe
              at 19:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:476
              • C:\Windows\SysWOW64\at.exe
                at 19:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:2204
                • C:\Windows\SysWOW64\at.exe
                  at 19:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:2740

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\32.cab

          Filesize

          47KB

          MD5

          9dda4db9e90ff039ad5a58785b9d626d

          SHA1

          507730d87b32541886ec1dd77f3459fa7bf1e973

          SHA256

          fc31b205d5e4f32fa0c71c8f72ee06b92a28bd8690f71ab8f94ff401af2228fe

          SHA512

          4cfecaaccd0f8f9e31690ff80cca83edc962e73861043fffded1a3847201455d5adca7c5ef3866c65e6e516205e67b2f31c8149aad5be1065c1eb586b013f86a

        • C:\Users\Admin\AppData\Local\Temp\64.cab

          Filesize

          49KB

          MD5

          8cfa6b4acd035a2651291a2a4623b1c7

          SHA1

          43571537bf2ce9f8e8089fadcbf876eaf4cf3ae9

          SHA256

          6e438201a14a70980048d2377c2195608d5dc2cf915f489c0a59ac0627c98fa9

          SHA512

          e0a73401ce74c8db69964ef5a53f2a1b8caf8c739359785970295dae82619e81c0a21466327a023cf4009e0c15981a20bf1e18c73821083908fce722faa82685

        • C:\Users\Admin\AppData\Local\Temp\888.vbs

          Filesize

          280B

          MD5

          8be57121a3ecae9c90cce4adf00f2454

          SHA1

          aca585c1b6409bc2475f011a436b319e42b356d8

          SHA256

          35d7204f9582b63b47942a4df9a55b8825b6d0af295b641f6257c39f7dda5f5e

          SHA512

          85521f6cd62dd5bb848933a188a9ddb83dd7ae2c5f4a97b65ba7785c3d58dba27694c7df308f4cf0fdaaa8c55251ff14ed1632e315a16d8d0b15217bac381f72

        • C:\Users\Admin\AppData\Local\Temp\wl.jpg

          Filesize

          80KB

          MD5

          029c9dc90ef99fdfba31c7e68e57138c

          SHA1

          1c994c598dd48de99a9250f363b738fbb84ce85d

          SHA256

          c8eba53df4d268ef0ddf382778290dc1a13faef122f78c92ff393f3081b7a135

          SHA512

          6209b9da1381654aaaada8cbb6bdf2fe88fd539a1c1ff68180bf1023399cbda5b0a1530796cff4f6be36bc44f313a765c63109a8b25afb9678818cd712dd88d0

        • C:\Users\Admin\AppData\Roaming\Lock.Microsoft

          Filesize

          8B

          MD5

          de6fdff1993c731e52e49d52a6e684d9

          SHA1

          120d1ff8a24109eed24ac1a5697383d50bcc0f47

          SHA256

          645c2d0cb9f6edf276f7dead9ab8c72531cdae22f54962d174c1339c30cb1b42

          SHA512

          99d05bf76a3a7466ccf27ac304ba35639716089d8dae388aaa707bfb6feb3f362251a65951663dd86abcac5a5e7358a5f29faedfe4c0b55ae136ba9d8f1209c1

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          207KB

          MD5

          1b6fccbc3e60fea8ce99c88318abedb6

          SHA1

          3750cd070bd279ac31836be12ba4197c0a408915

          SHA256

          21e822b4bda5354d7d98997d2cf96c2f283f93ec6b45eec709b870b260250aa4

          SHA512

          5052ad50e36cbedafcfe46d77f1ccdaa5deb92c8c209eea1ad71be94ec063a0e4c87d7331e540e02119ac32c593543fc92d82a7bb5ef6224cc1e722d00814165

        • C:\Windows\System32\migwiz\CRYPTBASE.dll

          Filesize

          106KB

          MD5

          1deeaa34fc153cffb989ab43aa2b0527

          SHA1

          7a58958483aa86d29cba8fc20566c770e1989953

          SHA256

          c3cfa6c00f3d2536c640f1ee6df3f289818628c0e290be2f08df2c330097158a

          SHA512

          abbd5e28096a981a1d07a38bb1808fab590d78a890fc7960a86d8d9a1ae0c597eab655a2457d61afbfbce8c720965b89c1071759b819168b08058ee5be17dc86

        • \Users\Admin\AppData\Local\Temp\terabysoftaller.exe 

          Filesize

          1013KB

          MD5

          a834493f082279e30f42207b9d869e36

          SHA1

          a82afa52664e50e34563f8675b18c55f946d5636

          SHA256

          16776d58278432ec05e34fcdeaae59872c24d2f54b5870ad75f23f1bf4a6ca24

          SHA512

          a37abde7665ac1642fb9df58f440620755ae44fc5978b1c978beaff3e8c8ad78a43ce25e49d4e6bf3f6e9113ab9819c3171a01f827d880639e95a0905012e4a6

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          2344d07538f8b6ca19713893a6065c92

          SHA1

          899aea43926b14e25d073ac0c15154c66a4f4042

          SHA256

          18c6e88a1e2c766ad460052452c50871c6b26a08129c4fda402507b6795699b7

          SHA512

          1e7b53066f9d8986b6bbaa6842eba25faee46898f62f831b037db630737c0f22661d543a9df38330146ac9883a1427d23e0d8e48f570cf1c2e2e0ca0cf4cf875

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          6b62e80a948dea16dadfc9def03037e0

          SHA1

          452502b65ae97a07b834163f9798acbe7cf55e30

          SHA256

          a604845ed106aa3287ceddc7e49938696fd4c29833689579e403beefa3c25972

          SHA512

          dec4726ff8c8a7c859d5d36ff45e107bc9ade1543d9b7df34af81516eb6906ae016893477260f86c1ab73892421492d93b34e72569a6132313cf65200ccebae7

        • \Windows\system\spoolsv.exe

          Filesize

          207KB

          MD5

          5b48a5f9d1206dd9b0420c09560b9fa8

          SHA1

          dd33324af96d33b66f5593283091439cf60887f7

          SHA256

          b273eb67ae69772a7b879974d74d159076bf566fe7bdf119923fc519ef7e3175

          SHA512

          336d6445306908f10e9d6271521c95638aa971aefa2cfe026858c31da553f6387d56a6f9cfef4e8b87cfc2d835a3d94217b0a369d2305913a7eaaeb234fe5bf4

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          c46b8c6d1f4e0865b590c1b0152e774c

          SHA1

          37c9c47a143a3977b1bf0c8b1f2237a40f8cbfb1

          SHA256

          175bfc85b38667ad643ee8a10be999d691e2f7da4957be660367d6c0ff0f7ca8

          SHA512

          9382e145f3100dd69ba048e26fcfd330390a478c465c50cec169a85aa5982ebeaa25362cd6b11bd773b94816e22863cf252147c0ac29233b203e5237550d80b3