Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 07:36
Static task
static1
Behavioral task
behavioral1
Sample
c210363cbccbc72e12118622bbbc7083.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c210363cbccbc72e12118622bbbc7083.exe
Resource
win10v2004-20230703-en
General
-
Target
c210363cbccbc72e12118622bbbc7083.exe
-
Size
144KB
-
MD5
c210363cbccbc72e12118622bbbc7083
-
SHA1
0305709f74dfee6377f62fa67f5addabcd00efea
-
SHA256
e190e4156d84f4311c5a4b10471bc3465847d6f8aee11a3d7598ca70733a0b71
-
SHA512
096cffcfd01e4685893c3e0c606cccab813b4c967f92b70b985fd958e8c49830e17719b60922c3328a792e6add315cc590f6a935735dac38eeadb734af284bdc
-
SSDEEP
3072:TahKyd2n31ZC5NfvRC5Xv5lX+RXcMNAUjc3dfPRjTyHDn:TahOPKRk/+RXRjsPRa
Malware Config
Extracted
lumma
gstatic-node.io
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
sisterlaboratory.exesisterlaboratory.exesisterllaboratory.exepid process 2944 sisterlaboratory.exe 5028 sisterlaboratory.exe 3520 sisterllaboratory.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c210363cbccbc72e12118622bbbc7083.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce c210363cbccbc72e12118622bbbc7083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c210363cbccbc72e12118622bbbc7083.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
sisterlaboratory.exedescription pid process target process PID 2944 set thread context of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sisterlaboratory.exesisterllaboratory.exedescription pid process Token: SeDebugPrivilege 2944 sisterlaboratory.exe Token: SeDebugPrivilege 3520 sisterllaboratory.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c210363cbccbc72e12118622bbbc7083.exesisterlaboratory.exedescription pid process target process PID 1380 wrote to memory of 2944 1380 c210363cbccbc72e12118622bbbc7083.exe sisterlaboratory.exe PID 1380 wrote to memory of 2944 1380 c210363cbccbc72e12118622bbbc7083.exe sisterlaboratory.exe PID 1380 wrote to memory of 2944 1380 c210363cbccbc72e12118622bbbc7083.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 2944 wrote to memory of 5028 2944 sisterlaboratory.exe sisterlaboratory.exe PID 1380 wrote to memory of 3520 1380 c210363cbccbc72e12118622bbbc7083.exe sisterllaboratory.exe PID 1380 wrote to memory of 3520 1380 c210363cbccbc72e12118622bbbc7083.exe sisterllaboratory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c210363cbccbc72e12118622bbbc7083.exe"C:\Users\Admin\AppData\Local\Temp\c210363cbccbc72e12118622bbbc7083.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterlaboratory.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterlaboratory.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterlaboratory.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterlaboratory.exe3⤵
- Executes dropped EXE
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterllaboratory.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sisterllaboratory.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5a25bcf04d4b89bf3cb81e1ed385ffa60
SHA180383e91fd13a1fd8b4536ab22b58059b5ae585b
SHA256a04ed08386329b18c80d97f879e35b971398eed3de397d040e3f3a8189751de6
SHA51236c76d9352ea80d706a647cb80722acf3e002dee8512558328c7c239e70cc22a5951ce89e1e239876d98ded5d6bd32f777f4e7089bc5f51878864c72c16f395d
-
Filesize
29KB
MD5a25bcf04d4b89bf3cb81e1ed385ffa60
SHA180383e91fd13a1fd8b4536ab22b58059b5ae585b
SHA256a04ed08386329b18c80d97f879e35b971398eed3de397d040e3f3a8189751de6
SHA51236c76d9352ea80d706a647cb80722acf3e002dee8512558328c7c239e70cc22a5951ce89e1e239876d98ded5d6bd32f777f4e7089bc5f51878864c72c16f395d
-
Filesize
29KB
MD5a25bcf04d4b89bf3cb81e1ed385ffa60
SHA180383e91fd13a1fd8b4536ab22b58059b5ae585b
SHA256a04ed08386329b18c80d97f879e35b971398eed3de397d040e3f3a8189751de6
SHA51236c76d9352ea80d706a647cb80722acf3e002dee8512558328c7c239e70cc22a5951ce89e1e239876d98ded5d6bd32f777f4e7089bc5f51878864c72c16f395d
-
Filesize
29KB
MD5d5015e9f58ba9b9323beb619a0facc0a
SHA1178d56c38329804eae86391c697c2732790ec923
SHA256e33ff871c04ee78873df7a09e162cae176540a0da1e935f985102058cce76742
SHA512c42e5799e58f097d7193841530f7081c659d991fc4bba5e5af4cd19623af2c93fe37312124048e966b944efd23b008b17a05c01b5592547aac48516a828b895a
-
Filesize
29KB
MD5d5015e9f58ba9b9323beb619a0facc0a
SHA1178d56c38329804eae86391c697c2732790ec923
SHA256e33ff871c04ee78873df7a09e162cae176540a0da1e935f985102058cce76742
SHA512c42e5799e58f097d7193841530f7081c659d991fc4bba5e5af4cd19623af2c93fe37312124048e966b944efd23b008b17a05c01b5592547aac48516a828b895a