Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 08:16

General

  • Target

    PO--080523-FM 06.exe

  • Size

    780KB

  • MD5

    ef9872c017473716478f16036dcc09a8

  • SHA1

    51d443812ec2c0185fa7c9eb50643e95a2889f14

  • SHA256

    6f4954a23f51c48f450992f809848da3a8bb5c1d7c4bc262332fa2507f1a1cc9

  • SHA512

    70e5638f7e9682298fae323439bc43a4835c427a0999c2c42eb4ee5de40bebebd55a188e0e3730dff937d51706bc374ed7586b0a09c78bf7307860708ea45f2d

  • SSDEEP

    12288:9XmYUJhz9u9GaG1/rVVPqUXvfrHMdQV4PKuyu+ZjF5oqt+yCXAV:IJu9tq/rbPpvjHM2MO9ZjF5oqotXAV

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO--080523-FM 06.exe
    "C:\Users\Admin\AppData\Local\Temp\PO--080523-FM 06.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vxCkxWKvbwwokh.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vxCkxWKvbwwokh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp667.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\PO--080523-FM 06.exe
      "C:\Users\Admin\AppData\Local\Temp\PO--080523-FM 06.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp667.tmp

    Filesize

    1KB

    MD5

    f09b152ba022de171b0e5430c5f38b11

    SHA1

    0976a2500d3b636b63890da35910275288728035

    SHA256

    2545fbed223704fa444c3dd9cce0a7947da7c9a1bb9a2546708cd5457c035b2d

    SHA512

    c319398f1f04fe8997d535bba383e8bf19fdd41951b3341dd9477ad8a2e96ec7ce2a6634144eb75da5bab9a6a98269b9d98a419262a1cefd81ecb9efa4935bf0

  • memory/1708-83-0x000000006ED20000-0x000000006F2CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1708-84-0x000000006ED20000-0x000000006F2CB000-memory.dmp

    Filesize

    5.7MB

  • memory/1708-86-0x0000000002690000-0x00000000026D0000-memory.dmp

    Filesize

    256KB

  • memory/1708-87-0x000000006ED20000-0x000000006F2CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2076-57-0x0000000000300000-0x0000000000312000-memory.dmp

    Filesize

    72KB

  • memory/2076-60-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2076-61-0x0000000004DD0000-0x0000000004E4C000-memory.dmp

    Filesize

    496KB

  • memory/2076-59-0x0000000004EF0000-0x0000000004F30000-memory.dmp

    Filesize

    256KB

  • memory/2076-58-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2076-54-0x0000000000E90000-0x0000000000F5A000-memory.dmp

    Filesize

    808KB

  • memory/2076-82-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2076-56-0x0000000004EF0000-0x0000000004F30000-memory.dmp

    Filesize

    256KB

  • memory/2076-55-0x0000000074970000-0x000000007505E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-71-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-79-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-81-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-77-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-75-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2472-74-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-85-0x0000000004800000-0x0000000004840000-memory.dmp

    Filesize

    256KB

  • memory/2472-73-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2472-69-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB