Analysis
-
max time kernel
49s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe
Resource
win7-20220812-en
General
-
Target
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe
-
Size
821KB
-
MD5
026f391b1d51a4a3704fa5b04e60b71c
-
SHA1
665984e68ec6c14e5c993cc091fed6acff1f657e
-
SHA256
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb
-
SHA512
35363ea7cbd11f391f9f3f3916007fe78d7f49c24159f920cc8fb6ca9928156435fd79b0184ec50c45f2202ce016732d8f33d469faf1a8db18211eb759855dec
-
SSDEEP
24576:Ebcr1kKQVqv+aHz0j2Fof53IP3ZomLurWGsMDSgFiaul:EbcrZQVaLzLoRYPJFyh+glul
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1104 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exepid process 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1260 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exedescription pid process target process PID 1604 wrote to memory of 1104 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe PID 1604 wrote to memory of 1104 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe PID 1604 wrote to memory of 1104 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe PID 1604 wrote to memory of 1104 1604 9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe"C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe" >> NUL2⤵
- Deletes itself
PID:1104
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD55a44c7ba5bbe4ec867233d67e4806848
SHA13b15be84aff20b322a93c0b9aaa62e25ad33b4b4
SHA2566ca0eafb20496edf23fc1480e8b545399f484a630698324be652ed10f45fa2fc
SHA512b69615f8f303eed22fdf0677a8d57b4b61df3487e385b5c2f108774a75a195b6f0dee1f0161c46118821b6b4478af68450db8620e735d13c518a565f4708a680