Analysis

  • max time kernel
    59s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    18-09-2024 20:17

General

  • Target

    FTA RansomWare _v1.exe

  • Size

    1.0MB

  • MD5

    eb3c187ffa93148e3c46c4a13e5087c0

  • SHA1

    3119ee5b8495efcb7ad9bc2e828679cb2abc339b

  • SHA256

    9de94be52e669684a401810dd255cfc34ca25f91432086e755f785acee789517

  • SHA512

    5006b26482fcf83a36c167a1f1ee60b46e0d59dea2d31700baa14e362b44949fac7f4f47a776d3a7f082c0186ba7f076b9693f01c00a92e37a2c5b061a23c922

  • SSDEEP

    12288:s81lcRX7J1Ote+HfKst1I0OaLU2oUefp6WnbmgM4nPllwurndV02WC/R:s81lgn0egDiHpnnbmgM4PlbsiJ

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops file in Drivers directory 64 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FTA RansomWare _v1.exe
    "C:\Users\Admin\AppData\Local\Temp\FTA RansomWare _v1.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4724
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
    1⤵
      PID:1648
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3012
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=de --service-sandbox-type=asset_store_service --field-trial-handle=1628,i,10321913671405323973,12338093221500387349,262144 --variations-seed-version --mojo-platform-channel-handle=3408 /prefetch:8
      1⤵
        PID:1388
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
        1⤵
          PID:1616
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy
          1⤵
            PID:4432
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:3836
            • C:\Windows\notepad.exe
              "C:\Windows\notepad.exe"
              1⤵
              • Suspicious use of FindShellTrayWindow
              PID:2396

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PN3DX0DD\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              cd2e0477d1761e022cdfcd49a187f035

              SHA1

              73de4f2c49d11c44a14c790ad6eb0bf8929a7802

              SHA256

              e27489848643b86ce44fc4a41214ab3ef8b2ba136d947e6a797351e072c2476d

              SHA512

              5a833fdd74eaff6397a88cccbdfe94d8c7671710a3b29f676fde1f942ea3c1e81e20b43d80214777e418904d31d75cb512cfcd2c9ff1ee2ca7a73a9252630e6c

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_SnippingTool_exe

              Filesize

              36KB

              MD5

              bad093419be1135cfe9694ea77088c78

              SHA1

              76204c7ca72cf666add9c9931389d635c82e8af0

              SHA256

              136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c

              SHA512

              3b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{461ad9ea-1d4b-4607-aae9-6463bce799ad}\0.0.filtertrie.intermediate.txt

              Filesize

              14KB

              MD5

              641b04c0c2e568ecea6d8d29f1e8e9e5

              SHA1

              086d3a349aced38254367eb0c4204637ac06033e

              SHA256

              806d6968803e161fd84c284e60962fe3eaebbb8602554349923453e44297073f

              SHA512

              bdf26098bbdec4fc023a1ce2bcbf6ee595f6381f2a4ede7f87caa8b09381fede8d5530e36dde46c7971398aeb515116ac363f2e30c5879ab3846bd5994b0814a

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{461ad9ea-1d4b-4607-aae9-6463bce799ad}\0.1.filtertrie.intermediate.txt

              Filesize

              5B

              MD5

              34bd1dfb9f72cf4f86e6df6da0a9e49a

              SHA1

              5f96d66f33c81c0b10df2128d3860e3cb7e89563

              SHA256

              8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

              SHA512

              e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{461ad9ea-1d4b-4607-aae9-6463bce799ad}\0.2.filtertrie.intermediate.txt

              Filesize

              5B

              MD5

              c204e9faaf8565ad333828beff2d786e

              SHA1

              7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

              SHA256

              d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

              SHA512

              e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{461ad9ea-1d4b-4607-aae9-6463bce799ad}\Apps.ft

              Filesize

              20KB

              MD5

              6f0c247471743fa91434f295608e4d40

              SHA1

              4a32b7ddf68e58e2a721d32f4d87644f19300dcd

              SHA256

              e957a261ed739a0a98f774ca46a4baa5e0c9b430cacf9df2148da46d6b1d038c

              SHA512

              3b8e42a74571feebd0de63a06265573040b39bad7477b11b38a78d1f67a8e0249697c9320f81b135e79ac852cac880d0f765697332067b8c29433638a542c251

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{461ad9ea-1d4b-4607-aae9-6463bce799ad}\Apps.index

              Filesize

              969KB

              MD5

              b29111b8884b5de898e2877cc008829e

              SHA1

              cfe1976d83a45a05ebb18218b2228ba20db2a40b

              SHA256

              2e1d413b2d59d3b873007493e70a3b870750009f105f04e95756deabc33c6504

              SHA512

              8e11f13900b7b90efc18af2341bf93c4b94c38ede58c5f578f676e5be9599c3369bcf6664494aa032f60da70d7327ba1a4eb54ef5e56ff814245ee46c091370d

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{8eb81df9-4169-49a5-a63e-5d27ae462a92}\apps.csg

              Filesize

              444B

              MD5

              5475132f1c603298967f332dc9ffb864

              SHA1

              4749174f29f34c7d75979c25f31d79774a49ea46

              SHA256

              0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

              SHA512

              54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{8eb81df9-4169-49a5-a63e-5d27ae462a92}\apps.schema

              Filesize

              150B

              MD5

              1659677c45c49a78f33551da43494005

              SHA1

              ae588ef3c9ea7839be032ab4323e04bc260d9387

              SHA256

              5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

              SHA512

              740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{8eb81df9-4169-49a5-a63e-5d27ae462a92}\appsconversions.txt

              Filesize

              1.4MB

              MD5

              2bef0e21ceb249ffb5f123c1e5bd0292

              SHA1

              86877a464a0739114e45242b9d427e368ebcc02c

              SHA256

              8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

              SHA512

              f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{8eb81df9-4169-49a5-a63e-5d27ae462a92}\appsglobals.txt

              Filesize

              343KB

              MD5

              931b27b3ec2c5e9f29439fba87ec0dc9

              SHA1

              dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

              SHA256

              541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

              SHA512

              4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{8eb81df9-4169-49a5-a63e-5d27ae462a92}\appssynonyms.txt

              Filesize

              237KB

              MD5

              06a69ad411292eca66697dc17898e653

              SHA1

              fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

              SHA256

              2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

              SHA512

              ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133711642969583651.txt

              Filesize

              74KB

              MD5

              f49be28fb77ae6d0f34753829256d56c

              SHA1

              8fb4c2135f4f16d1a92f710dea4215722845e653

              SHA256

              95c670be7031c14460996855d420407d49d164538520ad4b06489e7a21419f40

              SHA512

              02c8f418df4b1d990502055a5c53e34ed69d5df7769cdca71f222b9ddb07e513d2705a2beab600e8accda3a0c65255413ca10f91514f411a57c7dfa7884d0c36

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\SettingsCache.txt

              Filesize

              801KB

              MD5

              f1cf4337c201c880528cfd12111e103c

              SHA1

              8b1870cc3b0c43c8bfc88fb65d245da58e82651e

              SHA256

              aa5a3795294bcf13c6482f98209e65d40ba8fe6030e3588cc77e9cab0424d339

              SHA512

              75cfca0a9b339aaff950597e8aedf0cd3db090cc819816890e7f76abdac89aeb1562ea569aba77b35242563ac30770497e8e30d65efb378a1c97d10314bac5b2

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

              Filesize

              10KB

              MD5

              da031d91637fc2a506ec2a7c7ed4e1ae

              SHA1

              75285db476659c8d4d5f7726661f8765d1725104

              SHA256

              77c5575c8465236509e5976bd406a8b25e39d6f4a57a20fb554728d41f4df4c0

              SHA512

              162d78218fc4bb8815c49c6e80e063d3eefd7c535bd641f02f2ce319c20c8fe3598ed06c6b4325b580dd7247a3046dc35386a5470c069ae40f67e43b9e4f433b

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

              Filesize

              10KB

              MD5

              cfa963b1ba3c6115d488ce7c9e58902c

              SHA1

              2f9e2ec9e0ad04e624a6ff7016a1cfc60a10b0fa

              SHA256

              30aceea2bd1217ce98eb6b9b1a075ce8d386229eda1a59a886e9fb205b2323e5

              SHA512

              4ad9ef8f31ad65399c11a408955844af331c2218472f9489b742314e5ea5290cea1a7d61ab30b3d26272dcdd157bd81774f78c9ec2f5266cd291e972716ee78c

            • memory/2660-48-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-51-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-54-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-47-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-55-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-56-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-57-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-59-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-58-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-60-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-61-0x00000153FEA80000-0x00000153FEA81000-memory.dmp

              Filesize

              4KB

            • memory/2660-63-0x00000153FEB90000-0x00000153FEB91000-memory.dmp

              Filesize

              4KB

            • memory/2660-62-0x00000153FEA80000-0x00000153FEA81000-memory.dmp

              Filesize

              4KB

            • memory/2660-65-0x00000153FEB10000-0x00000153FEB11000-memory.dmp

              Filesize

              4KB

            • memory/2660-64-0x00000153FEB10000-0x00000153FEB11000-memory.dmp

              Filesize

              4KB

            • memory/2660-0-0x00000153FA640000-0x00000153FA650000-memory.dmp

              Filesize

              64KB

            • memory/2660-35-0x00000153FE900000-0x00000153FE901000-memory.dmp

              Filesize

              4KB

            • memory/2660-50-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-52-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-53-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-49-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-16-0x00000153FA740000-0x00000153FA750000-memory.dmp

              Filesize

              64KB

            • memory/2660-46-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-45-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-44-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-42-0x00000153FEA50000-0x00000153FEA51000-memory.dmp

              Filesize

              4KB

            • memory/2660-43-0x00000153FEA70000-0x00000153FEA71000-memory.dmp

              Filesize

              4KB

            • memory/2660-41-0x00000153FEA50000-0x00000153FEA51000-memory.dmp

              Filesize

              4KB

            • memory/2660-39-0x00000153FEA40000-0x00000153FEA41000-memory.dmp

              Filesize

              4KB

            • memory/2660-40-0x00000153FEA50000-0x00000153FEA51000-memory.dmp

              Filesize

              4KB

            • memory/2660-37-0x00000153FEA40000-0x00000153FEA41000-memory.dmp

              Filesize

              4KB

            • memory/3012-67-0x0000028917700000-0x0000028917800000-memory.dmp

              Filesize

              1024KB

            • memory/3012-68-0x0000028917700000-0x0000028917800000-memory.dmp

              Filesize

              1024KB