Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 16:26

General

  • Target

    66F26F04628F10BA6A66A759977F01F9.exe

  • Size

    19.3MB

  • MD5

    66f26f04628f10ba6a66a759977f01f9

  • SHA1

    b78d1c56fcda9a1bb8b0b6ecaf4d406960048922

  • SHA256

    aabc266802f04d1eeea56deddf0bc38f4e14d5c67685fd9c4a7c6d98efa7b31d

  • SHA512

    0c5bc4b933a7e5dff076e81020ec78b512fb05fb217a49d1469445c2e77d57dfb9280ac6d439f84499ec3c4450cf369bfcf219e7f4d9389fbd39e66d6afee25d

  • SSDEEP

    49152:BD95ju4gEp9ywkJa3REQPN69LcLPigAFLhRlqagBM9UOZmX/TQjE:BD9FgE6VJaBEQ9rigAF1qaEkUCmk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66F26F04628F10BA6A66A759977F01F9.exe
    "C:\Users\Admin\AppData\Local\Temp\66F26F04628F10BA6A66A759977F01F9.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XqNmX3it8n.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:760
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:1288
        • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\wininit.exe
          "C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\wininit.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2500

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\Adobe\Updater6\winlogon.exe
      Filesize

      19.3MB

      MD5

      66f26f04628f10ba6a66a759977f01f9

      SHA1

      b78d1c56fcda9a1bb8b0b6ecaf4d406960048922

      SHA256

      aabc266802f04d1eeea56deddf0bc38f4e14d5c67685fd9c4a7c6d98efa7b31d

      SHA512

      0c5bc4b933a7e5dff076e81020ec78b512fb05fb217a49d1469445c2e77d57dfb9280ac6d439f84499ec3c4450cf369bfcf219e7f4d9389fbd39e66d6afee25d

    • C:\Users\Admin\AppData\Local\Temp\XqNmX3it8n.bat
      Filesize

      202B

      MD5

      1fcef95a83b34cd405dc69a3b235c5ec

      SHA1

      a9df00797e8bc12c1b5bcf43c5168df7d7dc78d5

      SHA256

      347668124de421dc929f87dc66c07a7167252ede8540bd073a3cd8223d16ebae

      SHA512

      5cc9f8a8679e598fcd9782620ff92bf7e12bd7aa39203b83a98fababe8eb87e3adea0cb269b1dd88c287d6301c5c90194f10e589b18ee98f059c405865ccecda

    • memory/2208-35-0x0000000002260000-0x0000000002270000-memory.dmp
      Filesize

      64KB

    • memory/2208-6-0x00000000021E0000-0x0000000002206000-memory.dmp
      Filesize

      152KB

    • memory/2208-4-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-38-0x00000000025C0000-0x00000000025D6000-memory.dmp
      Filesize

      88KB

    • memory/2208-7-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-9-0x0000000000200000-0x000000000020E000-memory.dmp
      Filesize

      56KB

    • memory/2208-10-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-12-0x0000000000430000-0x000000000044C000-memory.dmp
      Filesize

      112KB

    • memory/2208-14-0x0000000000410000-0x0000000000420000-memory.dmp
      Filesize

      64KB

    • memory/2208-15-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-16-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-18-0x0000000002230000-0x0000000002248000-memory.dmp
      Filesize

      96KB

    • memory/2208-20-0x0000000000420000-0x0000000000430000-memory.dmp
      Filesize

      64KB

    • memory/2208-22-0x00000000005D0000-0x00000000005E0000-memory.dmp
      Filesize

      64KB

    • memory/2208-24-0x0000000000A10000-0x0000000000A1E000-memory.dmp
      Filesize

      56KB

    • memory/2208-36-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-31-0x0000000002250000-0x000000000225E000-memory.dmp
      Filesize

      56KB

    • memory/2208-27-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-33-0x00000000025A0000-0x00000000025B2000-memory.dmp
      Filesize

      72KB

    • memory/2208-26-0x0000000002210000-0x000000000221E000-memory.dmp
      Filesize

      56KB

    • memory/2208-83-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-3-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-29-0x0000000002220000-0x000000000222C000-memory.dmp
      Filesize

      48KB

    • memory/2208-40-0x000000001AA60000-0x000000001AA72000-memory.dmp
      Filesize

      72KB

    • memory/2208-42-0x0000000002270000-0x000000000227E000-memory.dmp
      Filesize

      56KB

    • memory/2208-44-0x0000000002280000-0x000000000228C000-memory.dmp
      Filesize

      48KB

    • memory/2208-46-0x000000001AA80000-0x000000001AA90000-memory.dmp
      Filesize

      64KB

    • memory/2208-48-0x000000001AA90000-0x000000001AAA0000-memory.dmp
      Filesize

      64KB

    • memory/2208-50-0x000000001AEE0000-0x000000001AF3A000-memory.dmp
      Filesize

      360KB

    • memory/2208-52-0x000000001AAA0000-0x000000001AAAE000-memory.dmp
      Filesize

      56KB

    • memory/2208-54-0x000000001AE80000-0x000000001AE90000-memory.dmp
      Filesize

      64KB

    • memory/2208-56-0x000000001AE90000-0x000000001AE9E000-memory.dmp
      Filesize

      56KB

    • memory/2208-58-0x000000001AEA0000-0x000000001AEA8000-memory.dmp
      Filesize

      32KB

    • memory/2208-60-0x000000001AF40000-0x000000001AF58000-memory.dmp
      Filesize

      96KB

    • memory/2208-62-0x000000001AEB0000-0x000000001AEBC000-memory.dmp
      Filesize

      48KB

    • memory/2208-64-0x000000001B4D0000-0x000000001B51E000-memory.dmp
      Filesize

      312KB

    • memory/2208-2-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-75-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-76-0x000007FEF58A3000-0x000007FEF58A4000-memory.dmp
      Filesize

      4KB

    • memory/2208-77-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
      Filesize

      9.9MB

    • memory/2208-1-0x0000000000A20000-0x0000000000DD8000-memory.dmp
      Filesize

      3.7MB

    • memory/2208-0-0x000007FEF58A3000-0x000007FEF58A4000-memory.dmp
      Filesize

      4KB

    • memory/2500-86-0x00000000013B0000-0x0000000001768000-memory.dmp
      Filesize

      3.7MB