Analysis
-
max time kernel
55s -
max time network
54s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe
Resource
win7
Behavioral task
behavioral2
Sample
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe
Resource
win10
General
-
Target
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe
-
Size
359KB
-
MD5
140e89a0319fc70aa12f5523cb2df432
-
SHA1
b08e8aca4dd650de5ef73f13ebc3eba71da12655
-
SHA256
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588
-
SHA512
e8c4f988cbff65bebecd4bfcda3473a354f2dac1bf646dab930c08924d876a11b937004859800b5544f2de7c5a73a3771b8275a16540dca6c9c876afff846020
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1496 wrote to memory of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 PID 1848 wrote to memory of 1968 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 26 PID 1848 wrote to memory of 1968 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 26 PID 1848 wrote to memory of 1968 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 26 PID 1848 wrote to memory of 1968 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1496 set thread context of 1848 1496 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe 24 -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeTcbPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeChangeNotifyPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeCreateTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeBackupPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeRestorePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeIncreaseQuotaPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeAssignPrimaryTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeImpersonatePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeTcbPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeChangeNotifyPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeCreateTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeBackupPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeRestorePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeIncreaseQuotaPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeAssignPrimaryTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeImpersonatePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeTcbPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeChangeNotifyPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeCreateTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeBackupPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeRestorePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeIncreaseQuotaPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeAssignPrimaryTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeImpersonatePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeTcbPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeChangeNotifyPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeCreateTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeBackupPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeRestorePrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeIncreaseQuotaPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Token: SeAssignPrimaryTokenPrivilege 1848 d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe -
Deletes itself 1 IoCs
pid Process 1968 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system 1 TTPs 10 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe"C:\Users\Admin\AppData\Local\Temp\d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Checks for installed software on the system
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\113163.bat" "C:\Users\Admin\AppData\Local\Temp\d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588.exe" "3⤵
- Deletes itself
PID:1968
-
-