Analysis
-
max time kernel
52s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
Resource
win10v2004-20220414-en
General
-
Target
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe
-
Size
96KB
-
MD5
b85e836c181e4b209d56c0d2df72d53e
-
SHA1
e3bf80c50892d44db8391f00b3329863a9d19993
-
SHA256
02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744
-
SHA512
0b767f55b1033e1340c0a98c0a880bdac102f6de79520cc868c357c1d0e54de70f76798398d16167dfed8594a83ff012050cfc57aa9c63f1343f9d12160220bb
Malware Config
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Executes dropped EXE 2 IoCs
pid Process 1336 w3wpdiag.exe 4568 w3wpdiag.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\SecurityApp 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Upgrade 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\system32\w3wpdiag.exe 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File opened for modification C:\Windows\system32\w3wpdiag.exe 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File created C:\Windows\system32\System.Web.Helpers.dll 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File opened for modification C:\Windows\system32\System.Web.Helpers.dll 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe File opened for modification C:\Windows\system32\InstallUtil.InstallLog w3wpdiag.exe File opened for modification C:\Windows\system32\w3wpdiag.InstallLog w3wpdiag.exe File created C:\Windows\system32\w3wpdiag.InstallState w3wpdiag.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2544 2092 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 76 PID 2092 wrote to memory of 2544 2092 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 76 PID 2544 wrote to memory of 1336 2544 cmd.exe 78 PID 2544 wrote to memory of 1336 2544 cmd.exe 78 PID 2092 wrote to memory of 3080 2092 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 79 PID 2092 wrote to memory of 3080 2092 02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe"C:\Users\Admin\AppData\Local\Temp\02151539f5f9f89a9021ea2914bb520772ae1c8deb938b0646c4a319367e4744.exe"1⤵
- Windows security modification
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c w3wpdiag.exe -install2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\w3wpdiag.exew3wpdiag.exe -install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1336
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c del *.InstallLog *.InstallState2⤵PID:3080
-
-
C:\Windows\system32\w3wpdiag.exe"C:\Windows\system32\w3wpdiag.exe"1⤵
- Executes dropped EXE
PID:4568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7
-
Filesize
254B
MD5c5d53c48801385ee40db4cd8fb2c8871
SHA1ced3935c87a5885f270d087b4e3e033eba71f7be
SHA256f8f0c2d425321cd0051c4400eb173cd88f00a7c2b670d1f42d7b107ed2a699a3
SHA512131071b64a871761a547c3fd89215493a51f2005eb356786f75e5f3f4f2c7382b842bb54dbabf5a574aaf94f3b59e730995229c5fcad0afae2e274bfa6587f0a
-
Filesize
135KB
MD54f13bec852002ea7208deaf82b53f90d
SHA1fffd7f988637d3f79bad6e6fb725f00aa8558044
SHA2566bdd4e1a2887176b20bdc2d710c5d81b68b18e7006a8281f4973e9e31e25f40f
SHA5122216dc754a787bc159e9bc363f8a57ee02caadce16dae41e73ce27cc37d7eef956983bf0dca7c78ef988030d69c4977a067b32667111ca10926a7d684771bf40
-
Filesize
352B
MD5be383fd6276114a5d483f97eb30f0e20
SHA10381d345da9668131e25032ad02581c09263f9bb
SHA2569e4a506eb9dbef1df26011133b620482107696e9b28fa795f74c80cb7b23af2b
SHA5125bb3d49dff84d2ae2fe69b5c1a315f2c0a4ccfc8d174b95d81da06ee14e31597f102949c05ba236fc210a7c8c977d70852f35c9b5e53a7012e7c90c3e66300e3
-
Filesize
58KB
MD5371b4380080e3d94ffcae1a7e9a0d5e2
SHA1f7088075d1c798f27b0d269c97dc877ff16f1401
SHA2562986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
SHA512990c3b43a9cdaa45432d2934aac005042f72ee4d1f441c474c07fa28e950c926e2474263bbc4bbd35aa74e4f6819f7194066f1f94dd300f2b04eee82bb7f5fb7