Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe
Resource
win10v2004-20221111-en
General
-
Target
b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe
-
Size
1.1MB
-
MD5
b76353f4f915d958df5617ac8c40ea67
-
SHA1
f565bad20741158afa83d4019ca9527afa1dbc64
-
SHA256
b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
-
SHA512
02c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
SSDEEP
24576:Etz8aJoW5Q4FA1If3x1bDPTnA52qmJwlpvj1ifNhLWp:iAA3XbPsIfNhLM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2020 Update.exe -
resource yara_rule behavioral1/memory/2020-70-0x0000000010000000-0x000000001005A000-memory.dmp upx behavioral1/memory/2020-71-0x0000000010000000-0x000000001005A000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1020 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 2020 Update.exe 2020 Update.exe 2020 Update.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Secure-Soft Stealer\\Update.exe\"" WScript.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\bearshare\shared\ Update.exe File created C:\Program Files (x86)\edonkey2000\incoming\ Update.exe File created C:\Program Files (x86)\kazaa\my shared folder\ Update.exe File created C:\Program Files (x86)\limewire\shared\ Update.exe File created C:\Program Files (x86)\morpheus\my shared folder\ Update.exe File created C:\Program Files (x86)\winmx\shared\ Update.exe File created C:\Program Files (x86)\grokster\my grokster\ Update.exe File created C:\Program Files (x86)\icq\shared folder\ Update.exe File created C:\Program Files (x86)\tesla\files\ Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 2020 Update.exe 2020 Update.exe 2020 Update.exe 2020 Update.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 27 PID 1824 wrote to memory of 1020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 27 PID 1824 wrote to memory of 1020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 27 PID 1824 wrote to memory of 1020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 27 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 1824 wrote to memory of 2020 1824 b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe 29 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 1932 2020 Update.exe 30 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31 PID 2020 wrote to memory of 964 2020 Update.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe"C:\Users\Admin\AppData\Local\Temp\b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Melt.bat" "2⤵
- Deletes itself
PID:1020
-
-
C:\Users\Admin\AppData\Roaming\Secure-Soft Stealer\Update.exe"C:\Users\Admin\AppData\Roaming\Secure-Soft Stealer\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Autorun.vbs"3⤵
- Adds Run key to start application
PID:1932
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Taskmanager.bat" "3⤵PID:964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5d1c35608e1592ddfc7ec8334c688ae45
SHA184effb46537586059c31b67ced3d5f81f81a2d0b
SHA256cec2156a84c71ef1d9f1a024b68b29e5d38d2f8725396bd19723e75c7cb6317b
SHA51257542401a27a825b48f387519f23a2b95d90ecd55552605475ee44f41c04e4fc335d20b0cc13fc9888d621457ef609c71b4f5c11bb1d062f2c8c9a4089803759
-
Filesize
254B
MD5878754cdcb4cd200d150e64f8e3fc5a7
SHA1bdd7554625c6f951d734062d1ceb387425f8f6da
SHA256c28feedbcf615c2f915b1944538203027bffa6c84ffab3d571c1392456c37675
SHA512045a84e22adb94fc4b22d34ecec6a010d7b4e9ec501e42a37abdb6098bd1c933f91b66ac1b7ea11f380f025a10c72e9d59c505e1b9e4af1d4a8f87e241e7e108
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6
-
Filesize
1.1MB
MD5b76353f4f915d958df5617ac8c40ea67
SHA1f565bad20741158afa83d4019ca9527afa1dbc64
SHA256b660ff6d5b64bb31076ff9b5011e819c2a34c4671746f2ebac9167729bcceb73
SHA51202c2a7e1d2ea6545ab608af8eed4b63c898339008a6b2e1fc6182eef27b1459de938d0edb5642b6187ace92b8ab399a333974e186dddf8357ff850f4b6cfc3b6