Analysis
-
max time kernel
177s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe
Resource
win10v2004-20221111-en
General
-
Target
763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe
-
Size
221KB
-
MD5
0b8e611a5d9820e5709dabac3728afc0
-
SHA1
af8a4552eb2c1accc38b2c3953b1e9b32f64527a
-
SHA256
763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc
-
SHA512
c4627ffab3314c3d26a5467f197a8762c91305d1abc1fdd89f8153fa57a0f3f4e88d05c6f7b5211152732bb5da08649912fc564e0513d8d363c543b549040459
-
SSDEEP
6144:w0i0DhlSlqqDLPyO06ODvcDjoG1oPKajg3GqVmnO76kL:w0i0DhlBqnGcDjoGyPKaE3Dd7XL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 584 axfom.exe -
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ymereb = "C:\\Users\\Admin\\AppData\\Roaming\\Afyfe\\axfom.exe" axfom.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run axfom.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run axfom.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 360 set thread context of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\475A1E2D-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe 584 axfom.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeSecurityPrivilege 1744 cmd.exe Token: SeManageVolumePrivilege 548 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 548 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 548 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 548 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 360 wrote to memory of 584 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 28 PID 360 wrote to memory of 584 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 28 PID 360 wrote to memory of 584 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 28 PID 360 wrote to memory of 584 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 28 PID 584 wrote to memory of 1120 584 axfom.exe 18 PID 584 wrote to memory of 1120 584 axfom.exe 18 PID 584 wrote to memory of 1120 584 axfom.exe 18 PID 584 wrote to memory of 1120 584 axfom.exe 18 PID 584 wrote to memory of 1120 584 axfom.exe 18 PID 584 wrote to memory of 1164 584 axfom.exe 21 PID 584 wrote to memory of 1164 584 axfom.exe 21 PID 584 wrote to memory of 1164 584 axfom.exe 21 PID 584 wrote to memory of 1164 584 axfom.exe 21 PID 584 wrote to memory of 1164 584 axfom.exe 21 PID 584 wrote to memory of 1200 584 axfom.exe 20 PID 584 wrote to memory of 1200 584 axfom.exe 20 PID 584 wrote to memory of 1200 584 axfom.exe 20 PID 584 wrote to memory of 1200 584 axfom.exe 20 PID 584 wrote to memory of 1200 584 axfom.exe 20 PID 584 wrote to memory of 360 584 axfom.exe 27 PID 584 wrote to memory of 360 584 axfom.exe 27 PID 584 wrote to memory of 360 584 axfom.exe 27 PID 584 wrote to memory of 360 584 axfom.exe 27 PID 584 wrote to memory of 360 584 axfom.exe 27 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 360 wrote to memory of 1744 360 763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe 29 PID 584 wrote to memory of 1716 584 axfom.exe 30 PID 584 wrote to memory of 1716 584 axfom.exe 30 PID 584 wrote to memory of 1716 584 axfom.exe 30 PID 584 wrote to memory of 1716 584 axfom.exe 30 PID 584 wrote to memory of 1716 584 axfom.exe 30 PID 584 wrote to memory of 828 584 axfom.exe 31 PID 584 wrote to memory of 828 584 axfom.exe 31 PID 584 wrote to memory of 828 584 axfom.exe 31 PID 584 wrote to memory of 828 584 axfom.exe 31 PID 584 wrote to memory of 828 584 axfom.exe 31 PID 584 wrote to memory of 548 584 axfom.exe 32 PID 584 wrote to memory of 548 584 axfom.exe 32 PID 584 wrote to memory of 548 584 axfom.exe 32 PID 584 wrote to memory of 548 584 axfom.exe 32 PID 584 wrote to memory of 548 584 axfom.exe 32 PID 584 wrote to memory of 1912 584 axfom.exe 33 PID 584 wrote to memory of 1912 584 axfom.exe 33 PID 584 wrote to memory of 1912 584 axfom.exe 33 PID 584 wrote to memory of 1912 584 axfom.exe 33 PID 584 wrote to memory of 1912 584 axfom.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe"C:\Users\Admin\AppData\Local\Temp\763225adfc440ff496e5fb3ddfadf95057f1a20b9cd29fbefb2d72b5ab44b3fc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Roaming\Afyfe\axfom.exe"C:\Users\Admin\AppData\Roaming\Afyfe\axfom.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0988c9b9.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1716
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-377856481213443954-16219504382098023873-514223886909486486-10784275-1817288607"1⤵PID:828
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD55e96b36e7bcf731a4514d3be83df1212
SHA1c543535cf140dfd33434bbc7f578689f930dbf16
SHA256b3d398bc238241d2db2d7c84f5791735ac89e41f299718f4c8bac9652ea189c4
SHA51218f37b8e4a751d03456c31d6f65445d85cc22d44b903c4af2027ba2964f6a4f96d0ef4cda62b4054867780c083cc319fee6249d071a0c89bd525e80e9acd826e
-
Filesize
221KB
MD5a432b8ab412c6f3343d5f887e40b5b14
SHA12e6c1e391d719d883b012d6a4ade753f293dfe26
SHA2562e58679c7faf5cd1a672ba0c8fefbf51e001dd7fa5a328fbea0cf041ff3dc90b
SHA5124865fe664977b1967313fc99f6e424df064ff08911b8df2c870630fff2e5309b5fc2eae7508761af93f7a012f39102d6e1c6c99f1f1cd84fd8af4e16862beb52
-
Filesize
221KB
MD5a432b8ab412c6f3343d5f887e40b5b14
SHA12e6c1e391d719d883b012d6a4ade753f293dfe26
SHA2562e58679c7faf5cd1a672ba0c8fefbf51e001dd7fa5a328fbea0cf041ff3dc90b
SHA5124865fe664977b1967313fc99f6e424df064ff08911b8df2c870630fff2e5309b5fc2eae7508761af93f7a012f39102d6e1c6c99f1f1cd84fd8af4e16862beb52
-
Filesize
421B
MD5c3663f564dbdd82cb3dffe681c206a06
SHA15b19a14705a71f96b566731f1ceb43aca0ed8f75
SHA25602c6bc817a867cb3fed3a8ef06640c2a1d9d2af762d835da3d1d3288699c001b
SHA512d245eee712b9cfff9557b57c59fdd224315f666210019c76d98ad0263834ef80764acdb43f82b29229ed979280ec792fbab3fde5419552c067d8786274aef08e
-
Filesize
4KB
MD5f1ca8560f3fa5c0877a6cc81ed5768b1
SHA14009b5c6a4a04ac03957a909f1b331dc0a4d642d
SHA256e8359ebfc39ee0d8641685f95693a3247ea0abe660c1e4d1182c0ba1e863d810
SHA5127c500e555b923709d3eb1940f5fab6be1f4ecec08522b94df581f583e863c85f9fd1549078cf16762d6831e4703c5a56663df9e84ea96f14c4b4c9b65b5748ee
-
Filesize
221KB
MD5a432b8ab412c6f3343d5f887e40b5b14
SHA12e6c1e391d719d883b012d6a4ade753f293dfe26
SHA2562e58679c7faf5cd1a672ba0c8fefbf51e001dd7fa5a328fbea0cf041ff3dc90b
SHA5124865fe664977b1967313fc99f6e424df064ff08911b8df2c870630fff2e5309b5fc2eae7508761af93f7a012f39102d6e1c6c99f1f1cd84fd8af4e16862beb52
-
Filesize
221KB
MD5a432b8ab412c6f3343d5f887e40b5b14
SHA12e6c1e391d719d883b012d6a4ade753f293dfe26
SHA2562e58679c7faf5cd1a672ba0c8fefbf51e001dd7fa5a328fbea0cf041ff3dc90b
SHA5124865fe664977b1967313fc99f6e424df064ff08911b8df2c870630fff2e5309b5fc2eae7508761af93f7a012f39102d6e1c6c99f1f1cd84fd8af4e16862beb52