Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe
Resource
win10v2004-20220812-en
General
-
Target
803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe
-
Size
178KB
-
MD5
3ee184d119f1f6957c05b6aa451b84ef
-
SHA1
b3f04a409242342be4c2d0b30ae589f845c33c67
-
SHA256
803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465
-
SHA512
8eef5bcc9697608b424c944f2c4496e108af75e29515c55e9e09e0222d56d5469f56b0a15278c9f0aa12e25ce83d8f9cf477f02a606ad7d652f0767c758dc22d
-
SSDEEP
3072:f837qeyMERRRRRARRRRRNSCZHJoCnRaw9sFXICRPEeruZlx+EgGCH:UeeyLRRRRRARRRRRUUoCRaF3RPEeQx+T
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1884 tmpF7E7.tmp.exe 1760 server.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe tmpF7E7.tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe tmpF7E7.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1884 tmpF7E7.tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\server-scren = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\server.exe" tmpF7E7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 server.exe 1760 server.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1648 803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe Token: SeDebugPrivilege 1884 tmpF7E7.tmp.exe Token: SeDebugPrivilege 1760 server.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1884 tmpF7E7.tmp.exe 1760 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1884 1648 803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe 28 PID 1648 wrote to memory of 1884 1648 803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe 28 PID 1648 wrote to memory of 1884 1648 803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe 28 PID 1648 wrote to memory of 1884 1648 803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe 28 PID 1884 wrote to memory of 1760 1884 tmpF7E7.tmp.exe 29 PID 1884 wrote to memory of 1760 1884 tmpF7E7.tmp.exe 29 PID 1884 wrote to memory of 1760 1884 tmpF7E7.tmp.exe 29 PID 1884 wrote to memory of 1760 1884 tmpF7E7.tmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe"C:\Users\Admin\AppData\Local\Temp\803bab3ce1caef148bcf469811fef3c5c7d1e780c4d44abe2ade82a41641d465.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\tmpF7E7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF7E7.tmp.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\server.exe" ONCE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD531766d181803bec9fb049bb12435d1e1
SHA14ad984f44b2c30a317fb5482f123831fec330d54
SHA2566a6a32e7e2d04cc8abf5bbf6aff0590fde8414dac724bd534db72eed0f1af92b
SHA512d08df438b2b23f8f0231c8e109eaf2cffcac3114b092a06b0771e7e93267b5b06116ec9bb88105c4f08f45a9d847987dc1f5b99f8d8762a6bc901e4d9ff5bc6a
-
Filesize
169KB
MD531766d181803bec9fb049bb12435d1e1
SHA14ad984f44b2c30a317fb5482f123831fec330d54
SHA2566a6a32e7e2d04cc8abf5bbf6aff0590fde8414dac724bd534db72eed0f1af92b
SHA512d08df438b2b23f8f0231c8e109eaf2cffcac3114b092a06b0771e7e93267b5b06116ec9bb88105c4f08f45a9d847987dc1f5b99f8d8762a6bc901e4d9ff5bc6a
-
Filesize
169KB
MD531766d181803bec9fb049bb12435d1e1
SHA14ad984f44b2c30a317fb5482f123831fec330d54
SHA2566a6a32e7e2d04cc8abf5bbf6aff0590fde8414dac724bd534db72eed0f1af92b
SHA512d08df438b2b23f8f0231c8e109eaf2cffcac3114b092a06b0771e7e93267b5b06116ec9bb88105c4f08f45a9d847987dc1f5b99f8d8762a6bc901e4d9ff5bc6a
-
Filesize
169KB
MD531766d181803bec9fb049bb12435d1e1
SHA14ad984f44b2c30a317fb5482f123831fec330d54
SHA2566a6a32e7e2d04cc8abf5bbf6aff0590fde8414dac724bd534db72eed0f1af92b
SHA512d08df438b2b23f8f0231c8e109eaf2cffcac3114b092a06b0771e7e93267b5b06116ec9bb88105c4f08f45a9d847987dc1f5b99f8d8762a6bc901e4d9ff5bc6a
-
Filesize
169KB
MD531766d181803bec9fb049bb12435d1e1
SHA14ad984f44b2c30a317fb5482f123831fec330d54
SHA2566a6a32e7e2d04cc8abf5bbf6aff0590fde8414dac724bd534db72eed0f1af92b
SHA512d08df438b2b23f8f0231c8e109eaf2cffcac3114b092a06b0771e7e93267b5b06116ec9bb88105c4f08f45a9d847987dc1f5b99f8d8762a6bc901e4d9ff5bc6a