Overview
overview
7Static
static
3Leaked.exe
windows7-x64
3Leaked.exe
windows10-2004-x64
7Leaked_Dat...rp.dll
windows7-x64
1Leaked_Dat...rp.dll
windows10-2004-x64
1Leaked_Dat...ty.dll
windows7-x64
1Leaked_Dat...ty.dll
windows10-2004-x64
Leaked_Dat...on.dll
windows7-x64
1Leaked_Dat...on.dll
windows10-2004-x64
1Leaked_Dat...on.dll
windows7-x64
1Leaked_Dat...on.dll
windows10-2004-x64
1Leaked_Dat...re.dll
windows7-x64
1Leaked_Dat...re.dll
windows10-2004-x64
1Leaked_Dat...ta.dll
windows7-x64
1Leaked_Dat...ta.dll
windows10-2004-x64
1Leaked_Dat...ce.dll
windows7-x64
1Leaked_Dat...ce.dll
windows10-2004-x64
1Leaked_Dat...ng.dll
windows7-x64
1Leaked_Dat...ng.dll
windows10-2004-x64
1Leaked_Dat...es.dll
windows7-x64
1Leaked_Dat...es.dll
windows10-2004-x64
1Leaked_Dat...ns.dll
windows7-x64
1Leaked_Dat...ns.dll
windows10-2004-x64
1Leaked_Dat...em.dll
windows7-x64
1Leaked_Dat...em.dll
windows10-2004-x64
1Leaked_Dat...on.dll
windows7-x64
1Leaked_Dat...on.dll
windows10-2004-x64
1Leaked_Dat...tp.dll
windows7-x64
1Leaked_Dat...tp.dll
windows10-2004-x64
1Leaked_Dat...cs.dll
windows7-x64
1Leaked_Dat...cs.dll
windows10-2004-x64
1Leaked_Dat...ml.dll
windows7-x64
1Leaked_Dat...ml.dll
windows10-2004-x64
1Analysis
-
max time kernel
70s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2023, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
Leaked.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Leaked.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Leaked_Data/Managed/Assembly-CSharp.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Leaked_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Leaked_Data/Managed/Mono.Security.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Leaked_Data/Managed/Mono.Security.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Leaked_Data/Managed/System.ComponentModel.Composition.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Leaked_Data/Managed/System.ComponentModel.Composition.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Leaked_Data/Managed/System.Configuration.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Leaked_Data/Managed/System.Configuration.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Leaked_Data/Managed/System.Core.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Leaked_Data/Managed/System.Core.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Leaked_Data/Managed/System.Data.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Leaked_Data/Managed/System.Data.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Leaked_Data/Managed/System.Diagnostics.StackTrace.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Leaked_Data/Managed/System.Diagnostics.StackTrace.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Leaked_Data/Managed/System.Drawing.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Leaked_Data/Managed/System.Drawing.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
Leaked_Data/Managed/System.EnterpriseServices.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Leaked_Data/Managed/System.EnterpriseServices.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Leaked_Data/Managed/System.Globalization.Extensions.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Leaked_Data/Managed/System.Globalization.Extensions.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Leaked_Data/Managed/System.IO.Compression.FileSystem.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Leaked_Data/Managed/System.IO.Compression.FileSystem.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
Leaked_Data/Managed/System.IO.Compression.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
Leaked_Data/Managed/System.IO.Compression.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Leaked_Data/Managed/System.Net.Http.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
Leaked_Data/Managed/System.Net.Http.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Leaked_Data/Managed/System.Numerics.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
Leaked_Data/Managed/System.Numerics.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Leaked_Data/Managed/System.Runtime.Serialization.Xml.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
Leaked_Data/Managed/System.Runtime.Serialization.Xml.dll
Resource
win10v2004-20230221-en
General
-
Target
Leaked.exe
-
Size
154KB
-
MD5
f439af344fcdccd3abe98eb5c3d7e156
-
SHA1
c5763f23be5f2b4e04e3e98a8ef891acf272d140
-
SHA256
ee8bae144532bcbeacd941fa0291922079229b13b0f42eeaad6ca00ed3c050e0
-
SHA512
85e5e2d5e91fadc4300c501db1bb6d46275c0e1deeb62ceaec45246c5e465f1a0f7998fb996874b716c5b0cfb3f99d45b8e3179fbcf1db16441a874219599fd0
-
SSDEEP
1536:wC79gXAX271lcBzqEY2lkCswVxYDXosWkd09dlgaUGXmLcNoxs:1gXpJozm2lkCsuYDbM2ZXs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 316 1776 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 Leaked.exe 1776 Leaked.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1776 wrote to memory of 884 1776 Leaked.exe 30 PID 1776 wrote to memory of 884 1776 Leaked.exe 30 PID 1776 wrote to memory of 884 1776 Leaked.exe 30 PID 884 wrote to memory of 1640 884 cmd.exe 32 PID 884 wrote to memory of 1640 884 cmd.exe 32 PID 884 wrote to memory of 1640 884 cmd.exe 32 PID 1776 wrote to memory of 316 1776 Leaked.exe 33 PID 1776 wrote to memory of 316 1776 Leaked.exe 33 PID 1776 wrote to memory of 316 1776 Leaked.exe 33 PID 1640 wrote to memory of 1060 1640 powershell.exe 34 PID 1640 wrote to memory of 1060 1640 powershell.exe 34 PID 1640 wrote to memory of 1060 1640 powershell.exe 34 PID 1060 wrote to memory of 1632 1060 cmd.exe 35 PID 1060 wrote to memory of 1632 1060 cmd.exe 35 PID 1060 wrote to memory of 1632 1060 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Leaked.exe"C:\Users\Admin\AppData\Local\Temp\Leaked.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\abra.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -Verb RunAs -FilePath '"C:\Users\Admin\AppData\Local\Temp\abra.bat"' -ArgumentList 'am_admin'"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\abra.bat" am_admin4⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAWwBTAHkAcwB0AGUAbQAuAEUAbgB2AGkAcgBvAG4AbQBlAG4AdABdADoAOgBHAGUAdABFAG4AdgBpAHIAbwBuAG0AZQBuAHQAVgBhAHIAaQBhAGIAbABlACgAJwBVAFMARQBSAFAAUgBPAEYASQBMAEUAJwApACAAKwAgACcAJwApAA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1776 -s 22682⤵
- Program crash
PID:316
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5c7e2ec60b2f5e2d1061e128318cd3f61
SHA154b2846e89d35a67698765d0b3920a1f05784bdd
SHA256613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38
SHA5128faabdcd2caf1e282ff7e6f5971a60e957ba5355d12a35db4b61b3de0672d9983791f4b05fab5656459733f188eb531749f64632619c9c192c31570b8a523869
-
Filesize
500B
MD5c7e2ec60b2f5e2d1061e128318cd3f61
SHA154b2846e89d35a67698765d0b3920a1f05784bdd
SHA256613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38
SHA5128faabdcd2caf1e282ff7e6f5971a60e957ba5355d12a35db4b61b3de0672d9983791f4b05fab5656459733f188eb531749f64632619c9c192c31570b8a523869
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a1df330ed04f1541227e1e85050920f9
SHA12cc14aac1a6a68502e2687e3af4fce9dd49dfcc5
SHA25611d4873ec880b522ca53f0488417b52203a0baf3a95207b7f03c01e728757e01
SHA512dbe559a69fce9dea14e99cc070d76f15d1ac777ce73da1da3d82e261a277a5aeb3574a6e3e305741f69da5113933cb133b0d102e28e5576ef015d15b68abce46
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JSRI1S5PNCUIMC7GD58Y.temp
Filesize7KB
MD5a1df330ed04f1541227e1e85050920f9
SHA12cc14aac1a6a68502e2687e3af4fce9dd49dfcc5
SHA25611d4873ec880b522ca53f0488417b52203a0baf3a95207b7f03c01e728757e01
SHA512dbe559a69fce9dea14e99cc070d76f15d1ac777ce73da1da3d82e261a277a5aeb3574a6e3e305741f69da5113933cb133b0d102e28e5576ef015d15b68abce46