Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 10:39
Behavioral task
behavioral1
Sample
08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe
Resource
win7-20230831-en
General
-
Target
08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe
-
Size
7.8MB
-
MD5
a230708ee631d73d420bb7c98e837cd7
-
SHA1
91d63bf0108e4c039f16eddcfc2fec0f9a54d566
-
SHA256
08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6
-
SHA512
22bbbd813ec87f2919b4863c9e169f22a897a44b7b2e36352fa47bec83f4cd36519b46239e75fe90c3ebb32a49f307eb69ef77d43503f878de8aa935db18c103
-
SSDEEP
196608:Nt2pOCslfeJfqXoHdvCznwBOQj7rFOzp5iv5bDZR1sElzSbrxB8EvW1q33vj+bqo:N48x6pVBOw7sRo
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/620-117-0x0000000074590000-0x0000000074599000-memory.dmp acprotect behavioral2/files/0x00060000000232bb-114.dat acprotect behavioral2/files/0x00060000000232bb-120.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe -
Executes dropped EXE 2 IoCs
pid Process 628 7za.dll 620 D184.tmp -
Loads dropped DLL 2 IoCs
pid Process 620 D184.tmp 620 D184.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3920-0-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/3920-3-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/220-22-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/220-23-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/220-25-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/220-26-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/220-27-0x0000000000400000-0x000000000142A000-memory.dmp upx behavioral2/memory/620-117-0x0000000074590000-0x0000000074599000-memory.dmp upx behavioral2/files/0x00060000000232bb-114.dat upx behavioral2/files/0x00060000000232bb-120.dat upx behavioral2/memory/220-125-0x0000000000400000-0x000000000142A000-memory.dmp upx -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini D184.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 620 set thread context of 2640 620 D184.tmp 97 -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\360\360sd\sl2Plugin.db 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\deepscan\speedmem2.hg 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\deepscan 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\SoftMgr 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\SoftMgr\ignorelist.ini 7za.dll File opened for modification C:\Program Files (x86)\360\360sd\sl2.db 7za.dll File created C:\Program Files (x86)\360\360sd\sl2Plugin.db 7za.dll File created C:\Program Files (x86)\360\360safe\360ss2.dat 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\360ss2.dat 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\ipc\kpuaf.dat 7za.dll File created C:\Program Files (x86)\360\360sd\sl2.db 7za.dll File opened for modification C:\Program Files (x86)\360\360safe 7za.dll File opened for modification C:\Program Files (x86)\360\360sd 7za.dll File created C:\Program Files (x86)\360\360safe\SoftMgr\ignorelist.ini 7za.dll File created C:\Program Files (x86)\360\360safe\ipc\kpuaf.dat 7za.dll File created C:\Program Files (x86)\360\360safe\deepscan\speedmem2.hg 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\ipc 7za.dll File created C:\Program Files (x86)\360\360safe\SoftMgr\somextrainfo.ini 7za.dll File opened for modification C:\Program Files (x86)\360\360safe\SoftMgr\somextrainfo.ini 7za.dll -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023133-30.dat nsis_installer_1 behavioral2/files/0x0009000000023133-30.dat nsis_installer_2 behavioral2/files/0x0009000000023133-31.dat nsis_installer_1 behavioral2/files/0x0009000000023133-31.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MINIE D184.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MINIE\LinksBandEnabled = "1" D184.tmp Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE D184.tmp Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\LinksBandEnabled = "1" D184.tmp -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 628 7za.dll Token: 35 628 7za.dll Token: SeSecurityPrivilege 628 7za.dll Token: SeSecurityPrivilege 628 7za.dll Token: SeIncreaseQuotaPrivilege 3812 WMIC.exe Token: SeSecurityPrivilege 3812 WMIC.exe Token: SeTakeOwnershipPrivilege 3812 WMIC.exe Token: SeLoadDriverPrivilege 3812 WMIC.exe Token: SeSystemProfilePrivilege 3812 WMIC.exe Token: SeSystemtimePrivilege 3812 WMIC.exe Token: SeProfSingleProcessPrivilege 3812 WMIC.exe Token: SeIncBasePriorityPrivilege 3812 WMIC.exe Token: SeCreatePagefilePrivilege 3812 WMIC.exe Token: SeBackupPrivilege 3812 WMIC.exe Token: SeRestorePrivilege 3812 WMIC.exe Token: SeShutdownPrivilege 3812 WMIC.exe Token: SeDebugPrivilege 3812 WMIC.exe Token: SeSystemEnvironmentPrivilege 3812 WMIC.exe Token: SeRemoteShutdownPrivilege 3812 WMIC.exe Token: SeUndockPrivilege 3812 WMIC.exe Token: SeManageVolumePrivilege 3812 WMIC.exe Token: 33 3812 WMIC.exe Token: 34 3812 WMIC.exe Token: 35 3812 WMIC.exe Token: 36 3812 WMIC.exe Token: SeIncreaseQuotaPrivilege 3812 WMIC.exe Token: SeSecurityPrivilege 3812 WMIC.exe Token: SeTakeOwnershipPrivilege 3812 WMIC.exe Token: SeLoadDriverPrivilege 3812 WMIC.exe Token: SeSystemProfilePrivilege 3812 WMIC.exe Token: SeSystemtimePrivilege 3812 WMIC.exe Token: SeProfSingleProcessPrivilege 3812 WMIC.exe Token: SeIncBasePriorityPrivilege 3812 WMIC.exe Token: SeCreatePagefilePrivilege 3812 WMIC.exe Token: SeBackupPrivilege 3812 WMIC.exe Token: SeRestorePrivilege 3812 WMIC.exe Token: SeShutdownPrivilege 3812 WMIC.exe Token: SeDebugPrivilege 3812 WMIC.exe Token: SeSystemEnvironmentPrivilege 3812 WMIC.exe Token: SeRemoteShutdownPrivilege 3812 WMIC.exe Token: SeUndockPrivilege 3812 WMIC.exe Token: SeManageVolumePrivilege 3812 WMIC.exe Token: 33 3812 WMIC.exe Token: 34 3812 WMIC.exe Token: 35 3812 WMIC.exe Token: 36 3812 WMIC.exe Token: SeIncreaseQuotaPrivilege 4788 WMIC.exe Token: SeSecurityPrivilege 4788 WMIC.exe Token: SeTakeOwnershipPrivilege 4788 WMIC.exe Token: SeLoadDriverPrivilege 4788 WMIC.exe Token: SeSystemProfilePrivilege 4788 WMIC.exe Token: SeSystemtimePrivilege 4788 WMIC.exe Token: SeProfSingleProcessPrivilege 4788 WMIC.exe Token: SeIncBasePriorityPrivilege 4788 WMIC.exe Token: SeCreatePagefilePrivilege 4788 WMIC.exe Token: SeBackupPrivilege 4788 WMIC.exe Token: SeRestorePrivilege 4788 WMIC.exe Token: SeShutdownPrivilege 4788 WMIC.exe Token: SeDebugPrivilege 4788 WMIC.exe Token: SeSystemEnvironmentPrivilege 4788 WMIC.exe Token: SeRemoteShutdownPrivilege 4788 WMIC.exe Token: SeUndockPrivilege 4788 WMIC.exe Token: SeManageVolumePrivilege 4788 WMIC.exe Token: 33 4788 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 D184.tmp -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3920 wrote to memory of 220 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 83 PID 3920 wrote to memory of 220 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 83 PID 3920 wrote to memory of 220 3920 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 83 PID 220 wrote to memory of 628 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 85 PID 220 wrote to memory of 628 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 85 PID 220 wrote to memory of 628 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 85 PID 220 wrote to memory of 4688 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 90 PID 220 wrote to memory of 4688 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 90 PID 220 wrote to memory of 4688 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 90 PID 4688 wrote to memory of 3812 4688 cmd.exe 92 PID 4688 wrote to memory of 3812 4688 cmd.exe 92 PID 4688 wrote to memory of 3812 4688 cmd.exe 92 PID 220 wrote to memory of 5032 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 93 PID 220 wrote to memory of 5032 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 93 PID 220 wrote to memory of 5032 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 93 PID 5032 wrote to memory of 4788 5032 cmd.exe 95 PID 5032 wrote to memory of 4788 5032 cmd.exe 95 PID 5032 wrote to memory of 4788 5032 cmd.exe 95 PID 220 wrote to memory of 620 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 96 PID 220 wrote to memory of 620 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 96 PID 220 wrote to memory of 620 220 08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe 96 PID 620 wrote to memory of 2640 620 D184.tmp 97 PID 620 wrote to memory of 2640 620 D184.tmp 97 PID 620 wrote to memory of 2640 620 D184.tmp 97 PID 620 wrote to memory of 2640 620 D184.tmp 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe"C:\Users\Admin\AppData\Local\Temp\08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe"C:\Users\Admin\AppData\Local\Temp\08d82241b3c0ac5eea0e07985696a4927e3acc0272e0d868335137d9b31b6cb6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\7za.dll"C:\Users\Admin\AppData\Local\Temp\7za.dll" x "C:\Users\Admin\AppData\Local\Temp\360Safe.dll" -o"C:\Program Files (x86)\360" -r -y3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C WMIC BIOS get Manufacturer3⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC BIOS get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C WMIC BIOS get Manufacturer3⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC BIOS get Manufacturer4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Users\Admin\AppData\Local\Temp\D184.tmpC:\Users\Admin\AppData\Local\Temp\D184.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe4⤵PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD57a8eea054b013d75c270b06784fafa70
SHA1bab072e99a9851000b5c093ba72773c520620949
SHA256505162f488334afe73bdba1e8a1922ec84b62a95133f68c1c2f57830ea204912
SHA512ac7674d2d0899a3548de455b97f328fa7203ae49def2392b06061f59c697b024fbcf50de18c8c6b610d0f397411d13e798315d1d131d5dd651d4e67fc16f5589
-
Filesize
637KB
MD5e3c061fa0450056e30285fd44a74cd2a
SHA18c7659e6ee9fe5ead17cae2969d3148730be509b
SHA256e0e2c7d0f740fe2a4e8658ce54dfb6eb3c47c37fe90a44a839e560c685f1f1fa
SHA512fe7796b4c5aa07c40aa2511a987fed59366d3c27bf7343f126f06cb937bfe7a7d8bd6cd785a7e3dc9087b99973e8542b6da7be6eed4585bd3cee13164aed79b4
-
Filesize
637KB
MD5e3c061fa0450056e30285fd44a74cd2a
SHA18c7659e6ee9fe5ead17cae2969d3148730be509b
SHA256e0e2c7d0f740fe2a4e8658ce54dfb6eb3c47c37fe90a44a839e560c685f1f1fa
SHA512fe7796b4c5aa07c40aa2511a987fed59366d3c27bf7343f126f06cb937bfe7a7d8bd6cd785a7e3dc9087b99973e8542b6da7be6eed4585bd3cee13164aed79b4
-
Filesize
416KB
MD56f0be919061559d466793b7f360266ae
SHA1219e8f25a1323f9eb6569a724ca13720f1afc3df
SHA256459ea02456d7c6a107a1644fd175eba086ba5c18e21d37cc59be02cf16ed8d5c
SHA512fbf1e94a2f1ffccf65783c95cb26ebcd5f997115b0cd18738f28ce39903dd9fb04c3b0d2f5b487c4536c639f6bc9d53b49f71719856e4622d939172a772e7178
-
Filesize
416KB
MD56f0be919061559d466793b7f360266ae
SHA1219e8f25a1323f9eb6569a724ca13720f1afc3df
SHA256459ea02456d7c6a107a1644fd175eba086ba5c18e21d37cc59be02cf16ed8d5c
SHA512fbf1e94a2f1ffccf65783c95cb26ebcd5f997115b0cd18738f28ce39903dd9fb04c3b0d2f5b487c4536c639f6bc9d53b49f71719856e4622d939172a772e7178
-
Filesize
5KB
MD5e5786e8703d651bc8bd4bfecf46d3844
SHA1fee5aa4b325deecbf69ccb6eadd89bd5ae59723f
SHA256d115bce0a787b4f895e700efe943695c8f1087782807d91d831f6015b0f98774
SHA512d14ad43a01db19428cd8ccd2fe101750860933409b5be2eb85a3e400efcd37b1b6425ce84e87a7fe46ecabc7b91c4b450259e624c178b86e194ba7da97957ba3
-
Filesize
5KB
MD5e5786e8703d651bc8bd4bfecf46d3844
SHA1fee5aa4b325deecbf69ccb6eadd89bd5ae59723f
SHA256d115bce0a787b4f895e700efe943695c8f1087782807d91d831f6015b0f98774
SHA512d14ad43a01db19428cd8ccd2fe101750860933409b5be2eb85a3e400efcd37b1b6425ce84e87a7fe46ecabc7b91c4b450259e624c178b86e194ba7da97957ba3
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
3KB
MD5e04876066daba4562e56919fe876d20a
SHA129195357c65ee1deebf52d1c44ee4e78764638ad
SHA256dd761fc060b9a313c26f68300e5c6f80d9ebc97427ed7b24613337dc52191a81
SHA51263ec3428dca0eb920bbd5f1a4697f6ab3e130d0177bb1a3098be1d7a23db26c1247566fa767b0dbb00341ee2c2d0d65ee3f668a9250b3baf8b42adbbdfd2de35