Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:44
Static task
static1
Behavioral task
behavioral1
Sample
27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe
Resource
win7-20220812-en
General
-
Target
27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe
-
Size
884KB
-
MD5
9129275edf49cff83327c10120a17d7d
-
SHA1
341d26a56440f86ab4151b7e8f64abab6abb9e0f
-
SHA256
27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a
-
SHA512
a07edbde06a0389b68b96fda94244ed6e911efaca98f8e7f1425e0a5538d2124a361dfd4e2d245edd837759665e7c2e1420b97aba1c9858a12c40e16fb518f18
-
SSDEEP
24576:bQUQNSnYKZvrfEkOS5bLvotxWFuHmGNvu12qT:cUQNoYozLvvotxguXm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
stealerunc.execsrss.exepid process 1272 stealerunc.exe 2028 csrss.exe -
Loads dropped DLL 3 IoCs
Processes:
27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exestealerunc.exepid process 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe 1272 stealerunc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
stealerunc.exedescription pid process target process PID 1272 set thread context of 2028 1272 stealerunc.exe csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1600 timeout.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exestealerunc.execsrss.execmd.exedescription pid process target process PID 2016 wrote to memory of 1272 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe stealerunc.exe PID 2016 wrote to memory of 1272 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe stealerunc.exe PID 2016 wrote to memory of 1272 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe stealerunc.exe PID 2016 wrote to memory of 1272 2016 27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe stealerunc.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 1272 wrote to memory of 2028 1272 stealerunc.exe csrss.exe PID 2028 wrote to memory of 112 2028 csrss.exe cmd.exe PID 2028 wrote to memory of 112 2028 csrss.exe cmd.exe PID 2028 wrote to memory of 112 2028 csrss.exe cmd.exe PID 2028 wrote to memory of 112 2028 csrss.exe cmd.exe PID 112 wrote to memory of 1600 112 cmd.exe timeout.exe PID 112 wrote to memory of 1600 112 cmd.exe timeout.exe PID 112 wrote to memory of 1600 112 cmd.exe timeout.exe PID 112 wrote to memory of 1600 112 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe"C:\Users\Admin\AppData\Local\Temp\27f47faa080d2b9f4c7672b4da78c6410a25b7af5571d3e748f83a01f2144d0a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\stealerunc.exe"C:\Users\Admin\AppData\Local\Temp\stealerunc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\STEALE~1.EXE4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\stealerunc.exeFilesize
552KB
MD59f8f31df7b0b9b8645566f4ac1ca01e3
SHA12105930b6c90e84cfa42650f3b3dd08f9091195f
SHA256b42e8b3e33db6373dfd95d473b98ac5de50b1e0103cb0b4c6e30c2746fdc563c
SHA512734947b24dfbb4d5782cafd48d064ae39f6fb57e930704868afbe64cf511ba08409de6c36c58fafef2e4a0637730b5bbd2d09af9a6dcaaabcef7afa61c5af71d
-
C:\Users\Admin\AppData\Local\Temp\stealerunc.exeFilesize
552KB
MD59f8f31df7b0b9b8645566f4ac1ca01e3
SHA12105930b6c90e84cfa42650f3b3dd08f9091195f
SHA256b42e8b3e33db6373dfd95d473b98ac5de50b1e0103cb0b4c6e30c2746fdc563c
SHA512734947b24dfbb4d5782cafd48d064ae39f6fb57e930704868afbe64cf511ba08409de6c36c58fafef2e4a0637730b5bbd2d09af9a6dcaaabcef7afa61c5af71d
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
\Users\Admin\AppData\Local\Temp\stealerunc.exeFilesize
552KB
MD59f8f31df7b0b9b8645566f4ac1ca01e3
SHA12105930b6c90e84cfa42650f3b3dd08f9091195f
SHA256b42e8b3e33db6373dfd95d473b98ac5de50b1e0103cb0b4c6e30c2746fdc563c
SHA512734947b24dfbb4d5782cafd48d064ae39f6fb57e930704868afbe64cf511ba08409de6c36c58fafef2e4a0637730b5bbd2d09af9a6dcaaabcef7afa61c5af71d
-
\Users\Admin\AppData\Local\Temp\stealerunc.exeFilesize
552KB
MD59f8f31df7b0b9b8645566f4ac1ca01e3
SHA12105930b6c90e84cfa42650f3b3dd08f9091195f
SHA256b42e8b3e33db6373dfd95d473b98ac5de50b1e0103cb0b4c6e30c2746fdc563c
SHA512734947b24dfbb4d5782cafd48d064ae39f6fb57e930704868afbe64cf511ba08409de6c36c58fafef2e4a0637730b5bbd2d09af9a6dcaaabcef7afa61c5af71d
-
\Users\Admin\AppData\Roaming\csrss.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
memory/112-81-0x0000000000000000-mapping.dmp
-
memory/1272-63-0x0000000074420000-0x00000000749CB000-memory.dmpFilesize
5.7MB
-
memory/1272-57-0x0000000000000000-mapping.dmp
-
memory/1272-79-0x0000000074420000-0x00000000749CB000-memory.dmpFilesize
5.7MB
-
memory/1600-83-0x0000000000000000-mapping.dmp
-
memory/2016-61-0x0000000074420000-0x00000000749CB000-memory.dmpFilesize
5.7MB
-
memory/2016-54-0x0000000075661000-0x0000000075663000-memory.dmpFilesize
8KB
-
memory/2028-68-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-72-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-74-0x0000000000441175-mapping.dmp
-
memory/2028-73-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-78-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-70-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-80-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-65-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-82-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2028-66-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB