Analysis

  • max time kernel
    58s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 14:33

General

  • Target

    af56457e60f0041e21b5bd2b9918f0638f6a3892b690aee6e64dabe8cd89de2e.exe

  • Size

    820KB

  • MD5

    fa2023aeb5a566a4751638bb8ac1d104

  • SHA1

    55cbc6eea1ac4640cceade82a27db242cba885a5

  • SHA256

    af56457e60f0041e21b5bd2b9918f0638f6a3892b690aee6e64dabe8cd89de2e

  • SHA512

    6ee9811ce6bcf9346bbaae3dc9c9b1fc86d5055b1b90433744eb852d8ba08ec7fe178b8850bc3ee821322f095e86f90a0777a1e500fb54d635017c96ebe86f3a

  • SSDEEP

    12288:F8qPkAjISbvFXnu600KOHLR7nwTOW8fhn8Vz4NlDtPZWZCR2a4CzuoJ6vGqA9VbJ:FjPhHLRDwiWoskpkgR2a4T6ZJ31+y

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af56457e60f0041e21b5bd2b9918f0638f6a3892b690aee6e64dabe8cd89de2e.exe
    "C:\Users\Admin\AppData\Local\Temp\af56457e60f0041e21b5bd2b9918f0638f6a3892b690aee6e64dabe8cd89de2e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\Service.exe
      "C:\Users\Admin\AppData\Local\Temp\Service.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Roaming\Configurable_Injector.exe
        "C:\Users\Admin\AppData\Roaming\Configurable_Injector.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Service.exe

    Filesize

    444KB

    MD5

    11ddccbfd860c56cafaaa647975bfc81

    SHA1

    e2561069dcbde284d0f897f03a375630182c9095

    SHA256

    7851aebd53a3991cbb64501a147d6d7d8bca18e28551f1d98342f8700d9f458e

    SHA512

    a4973ccaa5838de7fe0bd5996c3a0cf6fb95b69a9d0cc99ccd0ac3ba15fdc457bf49fe87a2d3c7afeeeccb680993a203f0063a4075ef74042ac613cfe02f9fc0

  • C:\Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • C:\Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • \Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • \Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • \Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • \Users\Admin\AppData\Roaming\Configurable_Injector.exe

    Filesize

    104KB

    MD5

    4244c6fd03a7e6b55c3aee0a1f3c9b1d

    SHA1

    f2df64b1690d3e5d07ddab6b536cac646a8ec9ee

    SHA256

    e5b9172d84dc29d836349f7645a3cc3582933e0db932face99813950bbc5965e

    SHA512

    e67e4c532bb4b5bd46833b6d550e58544289209bebe0a4fdfcaab8a94957c7d858bf427bd8d28c574f6c2d21aea4b1fcdd86f3172b4df083b9edb70b1c4ad2a5

  • memory/516-69-0x0000000074BA0000-0x000000007514B000-memory.dmp

    Filesize

    5.7MB

  • memory/516-70-0x0000000000A37000-0x0000000000A48000-memory.dmp

    Filesize

    68KB

  • memory/516-71-0x0000000074BA0000-0x000000007514B000-memory.dmp

    Filesize

    5.7MB

  • memory/1788-60-0x0000000002076000-0x0000000002095000-memory.dmp

    Filesize

    124KB

  • memory/1788-54-0x000007FEF4B20000-0x000007FEF5543000-memory.dmp

    Filesize

    10.1MB

  • memory/1788-56-0x0000000002076000-0x0000000002095000-memory.dmp

    Filesize

    124KB

  • memory/1788-55-0x000007FEF3840000-0x000007FEF48D6000-memory.dmp

    Filesize

    16.6MB

  • memory/2000-59-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB