Analysis

  • max time kernel
    49s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:33

General

  • Target

    9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe

  • Size

    821KB

  • MD5

    026f391b1d51a4a3704fa5b04e60b71c

  • SHA1

    665984e68ec6c14e5c993cc091fed6acff1f657e

  • SHA256

    9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb

  • SHA512

    35363ea7cbd11f391f9f3f3916007fe78d7f49c24159f920cc8fb6ca9928156435fd79b0184ec50c45f2202ce016732d8f33d469faf1a8db18211eb759855dec

  • SSDEEP

    24576:Ebcr1kKQVqv+aHz0j2Fof53IP3ZomLurWGsMDSgFiaul:EbcrZQVaLzLoRYPJFyh+glul

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe
    "C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\9d08e5d9cb0e0f7a4819d39e94d29a89e04a2a739ebcbe24becda189a51da6fb.exe" >> NUL
      2⤵
      • Deletes itself
      PID:1104
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1260

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Jellyfish.jpg
    Filesize

    757KB

    MD5

    5a44c7ba5bbe4ec867233d67e4806848

    SHA1

    3b15be84aff20b322a93c0b9aaa62e25ad33b4b4

    SHA256

    6ca0eafb20496edf23fc1480e8b545399f484a630698324be652ed10f45fa2fc

    SHA512

    b69615f8f303eed22fdf0677a8d57b4b61df3487e385b5c2f108774a75a195b6f0dee1f0161c46118821b6b4478af68450db8620e735d13c518a565f4708a680

  • memory/1104-58-0x0000000000000000-mapping.dmp
  • memory/1604-54-0x0000000075601000-0x0000000075603000-memory.dmp
    Filesize

    8KB

  • memory/1604-55-0x0000000000400000-0x0000000000517000-memory.dmp
    Filesize

    1.1MB

  • memory/1604-59-0x0000000000400000-0x0000000000517000-memory.dmp
    Filesize

    1.1MB