Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
e092af3320c668d973ca003e7ecc387f.exe
Resource
win7-20230712-en
General
-
Target
e092af3320c668d973ca003e7ecc387f.exe
-
Size
666KB
-
MD5
e092af3320c668d973ca003e7ecc387f
-
SHA1
93505578ef679ae9ba85e4369fe2d3b9404e22fe
-
SHA256
5b55637a26181e3420983b78038cedc5b9f3b10ac3cf0b904c6f9195f3b28baa
-
SHA512
8c156369576652b9016cc8247af9e29ce13028d28142c797d324bb82a0eb0e33626c9d7a6f9cc59e7a41b99c86af2aa790ee34a2d605df124970bd14c655970a
-
SSDEEP
12288:G/OvYe2xpDl+C2DLrst5BQdeBpzFxVegSKv/s7OkqhtDNA1C0aepmKsEJdb:G/OvWSst5WmVeg/v/aPsJI7fr
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2520 e092af3320c668d973ca003e7ecc387f.exe 2520 e092af3320c668d973ca003e7ecc387f.exe 4068 powershell.exe 4872 e092af3320c668d973ca003e7ecc387f.exe 4872 e092af3320c668d973ca003e7ecc387f.exe 4068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2520 e092af3320c668d973ca003e7ecc387f.exe Token: SeDebugPrivilege 4068 powershell.exe Token: SeDebugPrivilege 4872 e092af3320c668d973ca003e7ecc387f.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4068 2520 e092af3320c668d973ca003e7ecc387f.exe 90 PID 2520 wrote to memory of 4068 2520 e092af3320c668d973ca003e7ecc387f.exe 90 PID 2520 wrote to memory of 4068 2520 e092af3320c668d973ca003e7ecc387f.exe 90 PID 2520 wrote to memory of 4208 2520 e092af3320c668d973ca003e7ecc387f.exe 92 PID 2520 wrote to memory of 4208 2520 e092af3320c668d973ca003e7ecc387f.exe 92 PID 2520 wrote to memory of 4208 2520 e092af3320c668d973ca003e7ecc387f.exe 92 PID 2520 wrote to memory of 1236 2520 e092af3320c668d973ca003e7ecc387f.exe 94 PID 2520 wrote to memory of 1236 2520 e092af3320c668d973ca003e7ecc387f.exe 94 PID 2520 wrote to memory of 1236 2520 e092af3320c668d973ca003e7ecc387f.exe 94 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95 PID 2520 wrote to memory of 4872 2520 e092af3320c668d973ca003e7ecc387f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CwcZttCoAu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CwcZttCoAu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22E5.tmp"2⤵
- Creates scheduled task(s)
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"2⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5748373aebd7cd3a0af02c7a8247f2360
SHA14a1d8046e3fa8e9204ac1d380ecffeaae4b505fe
SHA256e6179f2b83261dff2b6f9022db74c850eab034a53537753c02a5c0db0e45a5f7
SHA512bd864016afc73246a674c48233c7b1fa01b57a4928c31e2573caa7b0522bf066b0dbcd46b043f76cc7319da3941df19a1bebfc6bf2218e1f71718357df005fea