Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 12:30

General

  • Target

    z9CONTAINERLOADINGPLANETD31JUL.exe

  • Size

    792KB

  • MD5

    0e842fe358b1b58b27f656e6a560a384

  • SHA1

    8d74628d62c52de01c5df2d663c87aedde613c71

  • SHA256

    b86b07dd168ae86bbfc16822df78793e8fbf52401673636047e8472fcd78ff26

  • SHA512

    84ec1bf1b7396b9ec6576a945fa825e578a6076c6b5aa3f2596af5461204590cd3dfe61e6780adea56137981cfd377f6456256f0f9e23cf7fcddc661c524e6fe

  • SSDEEP

    24576:ROguGvTGa60CZQPCFVNr8MxKRs6CE3jLMpppdpppppUO9Rs6CE3jLMpppdpppppb:vuuPV1QVNr8TRs6CE3jLbO9Rs6CE3jL6

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z9CONTAINERLOADINGPLANETD31JUL.exe
    "C:\Users\Admin\AppData\Local\Temp\z9CONTAINERLOADINGPLANETD31JUL.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZIYQhBAAJTizfW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp205.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3372
    • C:\Users\Admin\AppData\Local\Temp\z9CONTAINERLOADINGPLANETD31JUL.exe
      "{path}"
      2⤵
        PID:4044
      • C:\Users\Admin\AppData\Local\Temp\z9CONTAINERLOADINGPLANETD31JUL.exe
        "{path}"
        2⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z9CONTAINERLOADINGPLANETD31JUL.exe.log

      Filesize

      1KB

      MD5

      17573558c4e714f606f997e5157afaac

      SHA1

      13e16e9415ceef429aaf124139671ebeca09ed23

      SHA256

      c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

      SHA512

      f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

    • C:\Users\Admin\AppData\Local\Temp\tmp205.tmp

      Filesize

      1KB

      MD5

      f4c984e1005d78489838bec34b7515c8

      SHA1

      2cd6ab0b51497b4fe06a6a7a200f194c0f715e3e

      SHA256

      ec5a4e7ce706d44296cc13ba4dd30d042cdf29ce678dcef366c56bb33546203e

      SHA512

      9f031d22983456fed3ca49a43bc319cc5a18d12a8c21df07fabf3fdd6b6ffe0ab7ce4a468ce4c2f762d0954672eff4db9116e829327e2ed517018e97eb57130e

    • memory/2672-137-0x0000000005750000-0x00000000057E2000-memory.dmp

      Filesize

      584KB

    • memory/2672-142-0x00000000059C0000-0x00000000059D0000-memory.dmp

      Filesize

      64KB

    • memory/2672-133-0x0000000000BA0000-0x0000000000C6C000-memory.dmp

      Filesize

      816KB

    • memory/2672-138-0x00000000059C0000-0x00000000059D0000-memory.dmp

      Filesize

      64KB

    • memory/2672-139-0x0000000005650000-0x000000000565A000-memory.dmp

      Filesize

      40KB

    • memory/2672-140-0x00000000059D0000-0x0000000005A26000-memory.dmp

      Filesize

      344KB

    • memory/2672-141-0x0000000074800000-0x0000000074FB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2672-136-0x0000000005D00000-0x00000000062A4000-memory.dmp

      Filesize

      5.6MB

    • memory/2672-135-0x0000000074800000-0x0000000074FB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2672-149-0x0000000074800000-0x0000000074FB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2672-134-0x00000000056B0000-0x000000000574C000-memory.dmp

      Filesize

      624KB

    • memory/4120-146-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4120-150-0x0000000074800000-0x0000000074FB0000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-151-0x0000000004F20000-0x0000000004F30000-memory.dmp

      Filesize

      64KB

    • memory/4120-152-0x0000000004EB0000-0x0000000004F16000-memory.dmp

      Filesize

      408KB

    • memory/4120-154-0x0000000006510000-0x0000000006560000-memory.dmp

      Filesize

      320KB