Analysis
-
max time kernel
153s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe
Resource
win10v2004-20220812-en
General
-
Target
31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe
-
Size
255KB
-
MD5
dc18d6c13a02b6b718ac757a021fd1de
-
SHA1
af1d202faea3831d0cc57466b9686fa34dcf21c5
-
SHA256
31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6
-
SHA512
82c2639ea24793ad1eef19a84b388327ebf1744e1ae5736f02e0f0e0ac21efd25f93ac6d277f5a8bbde57d941681699a1ab574dbda4de696a530bfe30f957682
-
SSDEEP
6144:bpXbhU5GPtkUtyg89TiqdUyrmII8CBaSlHRQ08Ggsm:xbhKepyhTVU+jMHR58Ggs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1900 B6232F3A958.exe 1532 PLA51C9.exe -
resource yara_rule behavioral1/memory/1132-55-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/1900-73-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/1132-121-0x0000000000400000-0x00000000004AB000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 1900 B6232F3A958.exe 1900 B6232F3A958.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN PLA51C9.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3A0F7XZE6EMASI = "C:\\Recycle.Bin\\B6232F3A958.exe /q" PLA51C9.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" PLA51C9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" PLA51C9.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PhishingFilter PLA51C9.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery PLA51C9.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" PLA51C9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 1900 B6232F3A958.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe 1532 PLA51C9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe Token: SeDebugPrivilege 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe Token: SeDebugPrivilege 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe Token: SeDebugPrivilege 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe Token: SeDebugPrivilege 1900 B6232F3A958.exe Token: SeDebugPrivilege 1900 B6232F3A958.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe Token: SeDebugPrivilege 1532 PLA51C9.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1900 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 27 PID 1132 wrote to memory of 1900 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 27 PID 1132 wrote to memory of 1900 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 27 PID 1132 wrote to memory of 1900 1132 31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe 27 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1900 wrote to memory of 1532 1900 B6232F3A958.exe 28 PID 1532 wrote to memory of 1132 1532 PLA51C9.exe 26 PID 1532 wrote to memory of 1132 1532 PLA51C9.exe 26 PID 1532 wrote to memory of 1132 1532 PLA51C9.exe 26 PID 1532 wrote to memory of 1132 1532 PLA51C9.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe"C:\Users\Admin\AppData\Local\Temp\31bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Recycle.Bin\B6232F3A958.exe"C:\Recycle.Bin\B6232F3A958.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\PLA51C9.exe"C:\Users\Admin\AppData\Local\Temp\PLA51C9.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD554b0fba0cdb1cfe8ed6af174863e1952
SHA10a60880c1e1d16887bc70ee7d401acc106c8e3bc
SHA25660ae25034e38f633ab7595272b43c7923990a04e3cbb6727fe4558f9a9f691cb
SHA512c0cc86c6f43381b7f1d1b616bfec13c8f0ae2a48b736d0d773cd5ff37663d9ed127521a24f6f14f2b78bcb50825b3229b1bc3f366240e8e9b68a1202b3e3d1f0
-
Filesize
255KB
MD5dc18d6c13a02b6b718ac757a021fd1de
SHA1af1d202faea3831d0cc57466b9686fa34dcf21c5
SHA25631bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6
SHA51282c2639ea24793ad1eef19a84b388327ebf1744e1ae5736f02e0f0e0ac21efd25f93ac6d277f5a8bbde57d941681699a1ab574dbda4de696a530bfe30f957682
-
Filesize
255KB
MD5dc18d6c13a02b6b718ac757a021fd1de
SHA1af1d202faea3831d0cc57466b9686fa34dcf21c5
SHA25631bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6
SHA51282c2639ea24793ad1eef19a84b388327ebf1744e1ae5736f02e0f0e0ac21efd25f93ac6d277f5a8bbde57d941681699a1ab574dbda4de696a530bfe30f957682
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
255KB
MD5dc18d6c13a02b6b718ac757a021fd1de
SHA1af1d202faea3831d0cc57466b9686fa34dcf21c5
SHA25631bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6
SHA51282c2639ea24793ad1eef19a84b388327ebf1744e1ae5736f02e0f0e0ac21efd25f93ac6d277f5a8bbde57d941681699a1ab574dbda4de696a530bfe30f957682
-
Filesize
255KB
MD5dc18d6c13a02b6b718ac757a021fd1de
SHA1af1d202faea3831d0cc57466b9686fa34dcf21c5
SHA25631bac6a65cc8d9acddaa20713ea2f25674e824c0fadf2a63d8ac9c6c01b68be6
SHA51282c2639ea24793ad1eef19a84b388327ebf1744e1ae5736f02e0f0e0ac21efd25f93ac6d277f5a8bbde57d941681699a1ab574dbda4de696a530bfe30f957682
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be