Analysis
-
max time kernel
1200s -
max time network
1228s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 16:37
Static task
static1
Behavioral task
behavioral1
Sample
attachment.exe
Resource
win7v20210410
General
-
Target
attachment.exe
-
Size
28KB
-
MD5
4dc31642ea0512a2a69ee759f481b24d
-
SHA1
4bbc75b6bc95bcb6d5a3f69667f922541d52ccbf
-
SHA256
f8da48333c77feeb5fc217d503a3d9cc1f3decec6b5639d9152a9d832d2b51d1
-
SHA512
1500a8cfe012536510817148237b25c759fd74f5ff654186e5d3b4be12e21618462cdf9926d83f0485c32c1640413b616ef2ff9f851653ce4e366be16119ea2b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 2008 services.exe -
Processes:
resource yara_rule C:\Windows\services.exe upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
attachment.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" attachment.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
attachment.exedescription ioc process File created C:\Windows\java.exe attachment.exe File created C:\Windows\services.exe attachment.exe File opened for modification C:\Windows\java.exe attachment.exe -
Processes:
attachment.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 attachment.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 attachment.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C attachment.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 attachment.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 attachment.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
attachment.exedescription pid process target process PID 1856 wrote to memory of 2008 1856 attachment.exe services.exe PID 1856 wrote to memory of 2008 1856 attachment.exe services.exe PID 1856 wrote to memory of 2008 1856 attachment.exe services.exe PID 1856 wrote to memory of 2008 1856 attachment.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\attachment.exe"C:\Users\Admin\AppData\Local\Temp\attachment.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
8e2f3558c0fd57e90e77c9956ce6d96d
SHA12caece9e9e6b77266708695983c5ad8af51d805d
SHA256b6a8b4224f47dc560c891b3ade07285351cad21fa9dcdd6a968d2199f4574fe5
SHA512128b944f989b91cb9a054585a3b29a582b0e9b12962a646d14be0a65c170d58aa7251dc3e6dc7743f203241c4312f61ec8e1ee8feb67a049c1188f4b567dd73e
-
MD5
aa931ada14f9c68ddd43b350792f200f
SHA12fc583a996be6b2cd601ee81f3b3b613c93a49bc
SHA256ce1b6b061ec713a57642a79655ec9cc5f5d2233c3723812c6a4edd31c178a29d
SHA512a3c95bec43237a9b937560ca7d7a0d09ea759fd0010502b5787318ddfd3f1b1b47b256ac7048783df8b1fa8508350d18927ec8ae5026a76d724f13bcf1f07d73
-
MD5
7790a5311b057d9762f20b6035c46d21
SHA1c02260d9c7b6dec5b89e38c9d04920753fd21537
SHA25628844593b6b3da4c060d8826938782f95722f0c4143669ea0650645a232c830e
SHA51287450ea9c11e29c8524ab2de6dad4b14160d33c9067c340359de953c784aa3791116e4c3a620ec8b909b13344d789ab7f24a6993819a48ccf43d1426ff5c2abe
-
MD5
9f37190cecf0b5c21c4d0c261fb209d9
SHA175dffaa0829362ad0edd9f82f5ff0ba060f0f692
SHA2563afe9bf238d57c2f37b9dc794a98211a62e8338182ff62f2affdd43bba009f60
SHA512a72a3cb8767b56ee18bc77719e36c10bb05ecb5586f4563ffa99a793728f5fac722429d57502b38020103d98bafaf3400029b488146178494bfb6a765d24a24f
-
MD5
212eae3ed59f6fce3e1c843381124500
SHA128ffbea944028df8fc5bd3847fb7453b773cc974
SHA2562d803ec478aea131deaf4ce18e2ee775e824963aa0dd6c41df59821a7223093e
SHA512c087fb90f3bd67405fc9b514d1b6d859477632e8605bba78e99d0ba983b254886e3020da996e7e908213b207b62a39b8214109e5882bd9afbd911a6fa8911d16
-
MD5
f772ef8ce5fdae433fefbb8eadb6fb39
SHA1fda178393c7f4adb429e08eff9657daf20b05283
SHA2567b7ad44f551d52776251b1ac66ba5fb5d92c8b3bb842cfa43508f0261eab1314
SHA5124be43032fa1256b03ec93f6fce8fd0efbf973f5e0ed5dd6983a9b64d0b2cd2e1170ddf0540809216a959cfc97388ba7376a295ad81e833f7f8bbf4cae5b5fc95
-
MD5
a454cc07205ba0d74e9c1de93938858d
SHA13a917a4c9018890cf744ef389db4d83b8afd2f69
SHA25642ab77b817f5a4023d58fd3ad84ea591d50fece3e10c7e3af18bbdb4b996c911
SHA51223e6259d92a7d4fdfbabe467a498179fa915d48d28aef0f914bca1d40631a924387055a98c9b2b9ae7f1d1cf3642b700041e52bc9dd48233e98be642956ed8c7
-
MD5
41bbb4d9d6a2a0c1c300a28c097be01c
SHA112d8f6645f2ebf7ac662ddb4dd3433b35a5d8c09
SHA25657d878dd8fdfb56404e3b7843d49e8320ed5691df31d840385f1bb89e64298bf
SHA5122fd254476e26193beb839aec638ed5c4303addb6582efbe3df9ea5e429655ee249b0d89fa16c2800aa6cb67b1d0b849546951f9a675284773c25c94697c6f555
-
MD5
71924ae8444c006116dab0f77ae28338
SHA19f3b72a49e19c75eab144a5570e18842ed02683b
SHA256b2eefde9824e35d3503a195fca2b70b44deb8dad93c3867f057073fd49c47fde
SHA512898d3ed2dd42c8629f861285ab32325273e118d601e620148f7c29f5ca873eb1e49cfc9959c5d9aa1ef25639d0525804b347bc4353363e79c9c1b1f750419402
-
MD5
f968103fdde4daebf0534b33f43462ba
SHA1f8b1f5b42b2d6bd9194bd8c69b56b3d731857293
SHA256ba8f7a29137c35d8dd3771c4821a5139a6c97a0d1ecdb1f68cb9f04aaaf02602
SHA512c9b7d0ca110459d96d8c40833c6eaa76566c0850597d619f6aad5b812f77287bbc702ef9dac87b38888ccf8067e8e964ca9dd9838e109a8e34c383f331a0243c
-
MD5
e37e90b411ac81f4a850c789f0942736
SHA1d4d5381fc1ba1dc546cd115ce898f311dec97c46
SHA256fa51eccadf19845f2b87b1ba1447e750c063bb68d457e39ef904a4256c80af1d
SHA512aa4b8c6eefac9db0bbffd6e682d404e389eb3ae960963305a52d21da79a1b0c7a836a7103831cd53189fb42d0f5e29bd2253c35da804dc1656701d8fab69b91e
-
MD5
502d60cf1f11a1e666ad3f15f4743146
SHA12379b37c37cc45080584d1c9a8eb25997d252493
SHA256c650995c3fd943aef4ce51040ff613ccb6145cc33ac977252f1f96a2a2b06913
SHA512568d19aba188f3d7585a7d0e8156ac021aaae37d3095dafbbbfaba7bfcaef8bf234529fbb140213200debe0407f5e24f059d950876fca0f5f86a058905c973c7
-
MD5
8579508bfdc874629d91c4dd8cae2900
SHA1dc956c7221c1b71d9a88502583ca2cdd5d89aafd
SHA2560a035e8814a4a6cfdc92f5632016b14071544d93ed37488c05727016d3347195
SHA5120b32213a5cfd2c933e28f94e06df34cca45b9629d90239941e91a615879cd69ee376cf7e57cad652bf78579e6b64e0db260531749d7f1e5377abaca5e6560d2b
-
MD5
d41f0e9055b9d1784a37b0a0a7eb3152
SHA10191a1ebde5cf992384a7d1d748dcee255ae8c22
SHA2564a3835a4aa49308de70d50f1d834440725f4650da503181022af8e3389882d64
SHA512730cd4daa634c702ef17cf2586c0c75010c7fc3ebd811e777d6400aa8cd7249d08d815f7fc810241e42608208aa1babe07bb178b9bb9181a57caab5e91051115
-
MD5
8e77c8f98b60288dc7b88e26dd23238f
SHA1c6b063a272e4840123564b35b0fa41fb8b613067
SHA256d441ef59c77e874b00e20ccf2cc0811735c0111428ea935027af1f0309a075c3
SHA512351edf60e5ea79acd54d7d23dccf4611915d8acba21da64f60631d4f0ab3257308086a8c6811edc0aa95fb16bb1273d67b9dcfde85a97c375824fa7592e7754c
-
MD5
472c16a6a8bc764ea660115735adfa92
SHA1137bbf527b5404aff341861c1e75f3e5110fb489
SHA2568a2d91c7b44c9575830e319dc997f11aa7267ed834f8e9202d0b402866ad33a5
SHA5123413cdb3d940cdbeb4e9f30676258462e35476ce8671477fe1ec5d0ce61dd97b27fd95c41d451a38173b2e1e6e76ff53392176a64681f62d83049ee7e01f116a
-
MD5
cc80a098fcfe82cf2b14f35965f7ea03
SHA172223ea4e9283f5fa4a158352c25eebb101f1bd5
SHA256df2af9e2b69b0ee960c64443bc662676b2dc605861625d245b65d5cbae2e5dab
SHA5125f78668184acf8281eb273c8e4cf3b60d6c1ec54fbcd5eea8a472569a6803fb3d8405aa3934130560c6013e40298e0d00db8193fbc36a31b194aaba374a425a6
-
MD5
5a67664257bfb8b8a7d4fff5a503c0f8
SHA1a20d776d59bbc065d5e11dfc0ddb710a5e4873a4
SHA256eaa173c1fa9682f926af854cf0e793d5cc5d132403ff39b09a4e63b1c20c33fe
SHA51277928c7c19aa27b8b96ef145ab9aa243c1562335dad66b05d5c62130ffc7e81bc429d2e74f4d20456a0da679e0a87fc2b6fb9a7d382275de017c69af5f910e3d
-
MD5
f892ec92346181e1937b0b4ff8f2f90b
SHA14f692ab4a2f920fc8ef11202291fa267839826d3
SHA256da6a4e498d7bbeb38306a8a99b8159c84c3843306e965093abd051483c691f7e
SHA51239280baa3c3feb78f980eb36e960fdcaf2f3bdec304d149e4bf5a63c44ba14b7132360d1ed4b7067ca677bbc6711ca1ab1ef89f6fab7ee89609044fbf7c26a1b
-
MD5
dbe501da21c8fc32f3d8c80d8c3b911c
SHA14f5e965abed971b679d0468b53f6fbab905ab8ea
SHA25677d62949f43256ce5268caaf9af488937384bdf8161096ac9f90f928b09b9e58
SHA5120973cb1c1bc16505cd378839658671c90df3349ecd98d9ad5bac705dd59d46685a9f5035f12d6fe0a0f571f388c2ab60faba75287815dfe59ebfc9d16ace8b5f
-
MD5
3943d6f29fb0af636712dc7ce593ee81
SHA11e6509016f5f3f2167cc3b629d242b266be2e224
SHA256cd01506ed5bad950c1399ed5387bf063f77f2a287e7ca677ec3e0e4eea22a642
SHA512aeac1c4a0637aadb753fe2e77ed543f86aa32083853065d85afd92825adf3d1636cec1d9e579aff96817113cb14ba841da1e6f0151e3acf8ec2c2a3d7ff42c2e
-
MD5
7a99eca119a630250b52f623a33ab6fd
SHA1141a2f73c94c4a5cfe4faf7de3de9ba7c9843980
SHA256fb03168f2df822df12de23df6f9e7a260c3173e0f30f973d2031f9e18bfaefd7
SHA5123b5e92a67dd152cfa4804d3d11a470298f5245302e779742c98ec150e51c7a71a8c23829c2c91f9319bcee97c5e2fd10d705d34f510df9f47317e6e5f5ed8d4d
-
MD5
b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2