Analysis
-
max time kernel
254s -
max time network
346s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 10:13
Static task
static1
Behavioral task
behavioral1
Sample
b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe
Resource
win7-20221111-en
General
-
Target
b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe
-
Size
2.4MB
-
MD5
528b642e1ce1b2689d469b59fe2e8e41
-
SHA1
69f410bdc9764f7cf925687c7daaf01ce6d47b33
-
SHA256
b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2
-
SHA512
8b1bc1a86a2ad8dae6f7e8e95085b4f873b571c921af471dadafc397da67b192487beb0fb03232063ea8fd0627abc21c30152579dcf4dad4c5690703e4746502
-
SSDEEP
49152:JCR7FGaQDrygJFV7L20Qw1TdVXQKVJEIyDkMzIjWiCNRdqMMgVeu:J07FBQDWg7VP2Xw9dhJCkMGURdq+eu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 AllInOneUpload.exe -
Loads dropped DLL 2 IoCs
pid Process 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 432 set thread context of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main AllInOneUpload.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 892 AllInOneUpload.exe 892 AllInOneUpload.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 432 wrote to memory of 520 432 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 28 PID 520 wrote to memory of 892 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 29 PID 520 wrote to memory of 892 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 29 PID 520 wrote to memory of 892 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 29 PID 520 wrote to memory of 892 520 b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe"C:\Users\Admin\AppData\Local\Temp\b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\b348e896ed776977e96116f65477bbbbf61509f77e60fe8d4ea793f13dd39fe2.exe
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Roaming\AllInOneUpload.exe"C:\Users\Admin\AppData\Roaming\AllInOneUpload.exe"3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:892
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51fdbd0431c04412fa960a5e57f1f849d
SHA1eb9b054e9c7670550dae23d3b9d0dfe12de3c14f
SHA256dee5ae253938762466751f54ed52d1cd47992c93d503c4938af7f8f2bd45ccd2
SHA5124b21a120449f3193c3d31ac68574ebdb0b957e855e5a9e56dcf3f79c762ff05fbb9cfef85a4298e26bd0e80b048530a74ffff0447e36264698dc5edfce14b042
-
Filesize
2.0MB
MD51fdbd0431c04412fa960a5e57f1f849d
SHA1eb9b054e9c7670550dae23d3b9d0dfe12de3c14f
SHA256dee5ae253938762466751f54ed52d1cd47992c93d503c4938af7f8f2bd45ccd2
SHA5124b21a120449f3193c3d31ac68574ebdb0b957e855e5a9e56dcf3f79c762ff05fbb9cfef85a4298e26bd0e80b048530a74ffff0447e36264698dc5edfce14b042
-
Filesize
2.0MB
MD51fdbd0431c04412fa960a5e57f1f849d
SHA1eb9b054e9c7670550dae23d3b9d0dfe12de3c14f
SHA256dee5ae253938762466751f54ed52d1cd47992c93d503c4938af7f8f2bd45ccd2
SHA5124b21a120449f3193c3d31ac68574ebdb0b957e855e5a9e56dcf3f79c762ff05fbb9cfef85a4298e26bd0e80b048530a74ffff0447e36264698dc5edfce14b042
-
Filesize
2.0MB
MD51fdbd0431c04412fa960a5e57f1f849d
SHA1eb9b054e9c7670550dae23d3b9d0dfe12de3c14f
SHA256dee5ae253938762466751f54ed52d1cd47992c93d503c4938af7f8f2bd45ccd2
SHA5124b21a120449f3193c3d31ac68574ebdb0b957e855e5a9e56dcf3f79c762ff05fbb9cfef85a4298e26bd0e80b048530a74ffff0447e36264698dc5edfce14b042