Analysis
-
max time kernel
153s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe
Resource
win10v2004-20221111-en
General
-
Target
29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe
-
Size
418KB
-
MD5
532bcaf110fd9157b62b41170e36f760
-
SHA1
0a6e74eaf5ae9e57353c44532eeca59fbaa09f95
-
SHA256
29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a
-
SHA512
68df4eeec983cea5521de36b3ea5d415a34d3812c2da733e47694ad53db1c220cafbc1ead47fe20a85f26a21413c54fbd139e86fa37071da816dcc25cd17ee68
-
SSDEEP
6144:CLf04a2B2qYwwL+XYZ64LtURDEZ/cSy3zFzTRNy+:CLza2NYww6XYZJabNL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 112 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 1888 29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe 1888 29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe 1888 29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\B: svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt.cab svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\20221123233007.lck svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\netstatan.txt.cab svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt cmd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\sysinfo.txt cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\20221123233016.lck svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\dirlistC.txt cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\netstatan.txt cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\sysinfo.txt.cab svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\20221123232950.lck svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71 svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\20221123232919.lck svchost.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\svchost.exe 29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\svchost.exe 29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\rnt1.inf svchost.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1072 tasklist.exe 1996 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 468 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1644 systeminfo.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 systeminfo.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\mlang.dll,-4386 = "English (United States)" systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 468 NETSTAT.EXE Token: SeDebugPrivilege 1072 tasklist.exe Token: SeDebugPrivilege 1996 tasklist.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 112 wrote to memory of 1068 112 svchost.exe 29 PID 112 wrote to memory of 1068 112 svchost.exe 29 PID 112 wrote to memory of 1068 112 svchost.exe 29 PID 112 wrote to memory of 1068 112 svchost.exe 29 PID 1068 wrote to memory of 468 1068 cmd.exe 31 PID 1068 wrote to memory of 468 1068 cmd.exe 31 PID 1068 wrote to memory of 468 1068 cmd.exe 31 PID 1068 wrote to memory of 468 1068 cmd.exe 31 PID 112 wrote to memory of 536 112 svchost.exe 32 PID 112 wrote to memory of 536 112 svchost.exe 32 PID 112 wrote to memory of 536 112 svchost.exe 32 PID 112 wrote to memory of 536 112 svchost.exe 32 PID 536 wrote to memory of 1644 536 cmd.exe 34 PID 536 wrote to memory of 1644 536 cmd.exe 34 PID 536 wrote to memory of 1644 536 cmd.exe 34 PID 536 wrote to memory of 1644 536 cmd.exe 34 PID 112 wrote to memory of 1936 112 svchost.exe 37 PID 112 wrote to memory of 1936 112 svchost.exe 37 PID 112 wrote to memory of 1936 112 svchost.exe 37 PID 112 wrote to memory of 1936 112 svchost.exe 37 PID 1936 wrote to memory of 1072 1936 cmd.exe 39 PID 1936 wrote to memory of 1072 1936 cmd.exe 39 PID 1936 wrote to memory of 1072 1936 cmd.exe 39 PID 1936 wrote to memory of 1072 1936 cmd.exe 39 PID 112 wrote to memory of 1204 112 svchost.exe 40 PID 112 wrote to memory of 1204 112 svchost.exe 40 PID 112 wrote to memory of 1204 112 svchost.exe 40 PID 112 wrote to memory of 1204 112 svchost.exe 40 PID 1204 wrote to memory of 1996 1204 cmd.exe 42 PID 1204 wrote to memory of 1996 1204 cmd.exe 42 PID 1204 wrote to memory of 1996 1204 cmd.exe 42 PID 1204 wrote to memory of 1996 1204 cmd.exe 42 PID 112 wrote to memory of 1956 112 svchost.exe 43 PID 112 wrote to memory of 1956 112 svchost.exe 43 PID 112 wrote to memory of 1956 112 svchost.exe 43 PID 112 wrote to memory of 1956 112 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe"C:\Users\Admin\AppData\Local\Temp\29910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1888
-
C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\svchost.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\svchost.exe" -k netsvcs -s1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\cmd.execmd.exe /c netstat.exe -an >"C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\netstatan.txt"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat.exe -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo.exe >"C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\sysinfo.txt"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
- Modifies data under HKEY_USERS
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist.exe >"C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\tasklist.exetasklist.exe3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist.exe /SVC >"C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c dir /s C:\*.* >"C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\dirlistC.txt"2⤵
- Drops file in System32 directory
PID:1956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5532bcaf110fd9157b62b41170e36f760
SHA10a6e74eaf5ae9e57353c44532eeca59fbaa09f95
SHA25629910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a
SHA51268df4eeec983cea5521de36b3ea5d415a34d3812c2da733e47694ad53db1c220cafbc1ead47fe20a85f26a21413c54fbd139e86fa37071da816dcc25cd17ee68
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\netstatan.txt
Filesize2KB
MD5c0c893315626df2f6d771eeb4803f8ee
SHA18f2e51104648927e62ef84f3b69988ac7e2d2af0
SHA256d8782c366ae11ebd9544dd31261b662b4ab48d79af9e243b795d81ca8f278e27
SHA512bd0c144dc3f7b593785918afc56ed8d0add450f3670c4ef1ad7f0eab66ff3efb550c60a925281d467a69fbe70ad4e4ac6beb031f7af73149c855e1ea18e9b77f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\sysinfo.txt
Filesize2KB
MD509a9cf61089a75e7e3b47b1307ddf21e
SHA1bea528e16fb877e5c2d44e385c6a7e238647eb09
SHA256a303639f0653babc7d96d963d7ed028a95c738fb75b075777b7d2f33798ee6a6
SHA5124067a4d5fa48f2639f0e6b32f7685b96f2804c2d05639a4663d81e382f643936e327c114348a6a8c9850028d78bdf4d7fb47b6b5fae48e17a759151a4483a634
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt
Filesize2KB
MD5af7492264d05e2197b752724fc5cdeb9
SHA1b7d465201b5cc3fff6d3a45074d2239bc907ac62
SHA256871a0de6fb23027b61636cde84a88015f66ba79fa9bb10c05a3f00e3bd50c44e
SHA5127d13f447428a6a63e5c0a6f2be2ea2a46cd34d7720398b675af29c4e847de1937c8f3b8ae15689993e61e10df5638f3905ec46ef262272f44de60dccac59f321
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\AddIns\InternalLog\D41D8CD98F00B204E9800998ECF8427E\RP71\tasklist.txt
Filesize2KB
MD51b09613208952146461a3b130f65f414
SHA1620830c211117ffc63ba1fdcdab92edffa5a40dd
SHA256e6f055df03811acd767db03e499eacb973a3bb08192101aa529ccce691657635
SHA5122b3910c6e6f068830258bfc2c3c75b82e5aeae64238035f2cb10ce2923ca1c259820ce5137439e824d7e2372c649a198e9d5f0385312c3bcb137f8fd93dbbc6f
-
Filesize
418KB
MD5532bcaf110fd9157b62b41170e36f760
SHA10a6e74eaf5ae9e57353c44532eeca59fbaa09f95
SHA25629910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a
SHA51268df4eeec983cea5521de36b3ea5d415a34d3812c2da733e47694ad53db1c220cafbc1ead47fe20a85f26a21413c54fbd139e86fa37071da816dcc25cd17ee68
-
Filesize
418KB
MD5532bcaf110fd9157b62b41170e36f760
SHA10a6e74eaf5ae9e57353c44532eeca59fbaa09f95
SHA25629910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a
SHA51268df4eeec983cea5521de36b3ea5d415a34d3812c2da733e47694ad53db1c220cafbc1ead47fe20a85f26a21413c54fbd139e86fa37071da816dcc25cd17ee68
-
Filesize
418KB
MD5532bcaf110fd9157b62b41170e36f760
SHA10a6e74eaf5ae9e57353c44532eeca59fbaa09f95
SHA25629910422093c7e6ae57dae350cc60e24e17e0ef5bd84ea9b4680d122f7667d6a
SHA51268df4eeec983cea5521de36b3ea5d415a34d3812c2da733e47694ad53db1c220cafbc1ead47fe20a85f26a21413c54fbd139e86fa37071da816dcc25cd17ee68