Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 14:21

General

  • Target

    511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32.exe

  • Size

    404KB

  • MD5

    b9f2c19f9fdc3ce0bfdf0bebe422215f

  • SHA1

    e4d5b277ccf1cdf1f0597c5109abff21c3b630f7

  • SHA256

    511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32

  • SHA512

    4cb5377daf67ef9732ee6cc46284f37df10bda97719975e50da0ab532f87108aa48c85a02d38d05b90a4ce610f9e7ad73add765aae25b8aaf0bb6033d8faa60b

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32.exe
    "C:\Users\Admin\AppData\Local\Temp\511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\eellxnbo.exe "C:\Users\Admin\AppData\Local\Temp\511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:1300
      • C:\Users\Admin\AppData\Local\Temp\eellxnbo.exe
        C:\Users\Admin\AppData\Local\Temp\\eellxnbo.exe "C:\Users\Admin\AppData\Local\Temp\511e62284e93db96b180f64eda5d392dc5a602acd492e555f2d75a1a24624f32.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2592
        • \??\c:\windows\SysWOW64\rundll32.exe
          c:\windows\system32\rundll32.exe "c:\Program Files\pwemnzp\cmjnr.dll",Verify C:\Users\Admin\AppData\Local\Temp\eellxnbo.exe
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\Program Files\pwemnzp\cmjnr.dll

    Filesize

    228KB

    MD5

    08f7922144c9fa37b1e4448c775c89c6

    SHA1

    f6428a9b8430a2285cc7a0e0bc5c9a1f4c3e346a

    SHA256

    5c4228dfcf4df1108aa0a726b4ce9fdcf395c2ca6538a75778c2656ac1c9fe48

    SHA512

    b7a3e5aeff19c5e48c7cdf3e4294cb9d584afb2666570f0f042087e354ea0fcf1f3ea8ad8ceb3e43f0e9a297918a42e5eba7d9bd14bcbd40c56eada9caa1070c

  • \Users\Admin\AppData\Local\Temp\eellxnbo.exe

    Filesize

    404KB

    MD5

    2646353fb504e77874b57ad144ae737d

    SHA1

    0ebf1f9a89eb779e5ea13cadd0af543d6d0bb8fb

    SHA256

    86441982de71b442ce80136d719276c63069c9cfc3419bd532a099c585580362

    SHA512

    eaf40f588c9bf9f0082d560c44503dfc4d285ad7714bb2c0c5b0b6cfb3069991f221413cd181f756280969d8629f5380a607031d527b29203af409f16dd49324

  • memory/2204-0-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2204-2-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2592-7-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2592-9-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2712-15-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2712-16-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2712-18-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2712-20-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB