Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 03:21
Static task
static1
Behavioral task
behavioral1
Sample
7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe
Resource
win7-en-20211208
General
-
Target
7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe
-
Size
1.0MB
-
MD5
61a3d983a1fde813204b8f6f13842163
-
SHA1
336a3a59b782b49c2253bd0afeefdb43b24f70b6
-
SHA256
7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda
-
SHA512
a6cdbc9faae3f9d989d9c5f165dd56c3822997e463bbc924b61067fb1b1719b14ec8d60a4046ade564bdc310dd6177dfa8e84d04a0ac9226cd3f1cfdeb2adbe9
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1716-58-0x0000000000550000-0x0000000000578000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\s: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\x: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\h: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\g: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\n: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\p: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\u: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\w: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\z: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\e: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\o: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\r: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\t: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\v: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\l: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\b: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\f: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\i: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\k: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\m: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\q: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\y: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe File opened (read-only) \??\a: 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1524-65-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/1524-66-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/1524-67-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/1524-68-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/1524-70-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1716 wrote to memory of 1524 1716 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 27 PID 1524 wrote to memory of 960 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 28 PID 1524 wrote to memory of 960 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 28 PID 1524 wrote to memory of 960 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 28 PID 1524 wrote to memory of 960 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 28 PID 1524 wrote to memory of 1844 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 30 PID 1524 wrote to memory of 1844 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 30 PID 1524 wrote to memory of 1844 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 30 PID 1524 wrote to memory of 1844 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 30 PID 1524 wrote to memory of 2044 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 32 PID 1524 wrote to memory of 2044 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 32 PID 1524 wrote to memory of 2044 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 32 PID 1524 wrote to memory of 2044 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 32 PID 1524 wrote to memory of 1576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 34 PID 1524 wrote to memory of 1576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 34 PID 1524 wrote to memory of 1576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 34 PID 1524 wrote to memory of 1576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 34 PID 1524 wrote to memory of 964 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 36 PID 1524 wrote to memory of 964 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 36 PID 1524 wrote to memory of 964 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 36 PID 1524 wrote to memory of 964 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 36 PID 1524 wrote to memory of 1756 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 38 PID 1524 wrote to memory of 1756 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 38 PID 1524 wrote to memory of 1756 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 38 PID 1524 wrote to memory of 1756 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 38 PID 1524 wrote to memory of 1068 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 40 PID 1524 wrote to memory of 1068 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 40 PID 1524 wrote to memory of 1068 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 40 PID 1524 wrote to memory of 1068 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 40 PID 1524 wrote to memory of 452 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 42 PID 1524 wrote to memory of 452 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 42 PID 1524 wrote to memory of 452 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 42 PID 1524 wrote to memory of 452 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 42 PID 1524 wrote to memory of 908 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 44 PID 1524 wrote to memory of 908 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 44 PID 1524 wrote to memory of 908 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 44 PID 1524 wrote to memory of 908 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 44 PID 1524 wrote to memory of 1120 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 47 PID 1524 wrote to memory of 1120 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 47 PID 1524 wrote to memory of 1120 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 47 PID 1524 wrote to memory of 1120 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 47 PID 1524 wrote to memory of 1608 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 48 PID 1524 wrote to memory of 1608 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 48 PID 1524 wrote to memory of 1608 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 48 PID 1524 wrote to memory of 1608 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 48 PID 1524 wrote to memory of 576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 51 PID 1524 wrote to memory of 576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 51 PID 1524 wrote to memory of 576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 51 PID 1524 wrote to memory of 576 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 51 PID 1524 wrote to memory of 1644 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 52 PID 1524 wrote to memory of 1644 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 52 PID 1524 wrote to memory of 1644 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 52 PID 1524 wrote to memory of 1644 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 52 PID 1524 wrote to memory of 1080 1524 7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe"C:\Users\Admin\AppData\Local\Temp\7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe"C:\Users\Admin\AppData\Local\Temp\7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:1756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:1120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:520
-
-