Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe
Resource
win10v2004-20230915-en
General
-
Target
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe
-
Size
337KB
-
MD5
b216e5f4f710a3383c355f738e1cfeff
-
SHA1
8ea0c462d67c04935ceb231625a7583d408d78d2
-
SHA256
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
-
SHA512
a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
SSDEEP
6144:riDLXvujLfRwDDRCRYA1O+3w8DkhYmJzRy2:riD7Gf5iRCRYaBpDxIzt
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe -
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2644 winmgr.exe 2512 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-505040927557027642084862846502470750\\winmgr.exe" 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-505040927557027642084862846502470750\\winmgr.exe" 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3040 set thread context of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 2644 set thread context of 2512 2644 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-505040927557027642084862846502470750\winmgr.exe 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe File opened for modification C:\Windows\M-505040927557027642084862846502470750\winmgr.exe 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe File opened for modification C:\Windows\M-505040927557027642084862846502470750 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 3040 wrote to memory of 2820 3040 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 28 PID 2820 wrote to memory of 2752 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 29 PID 2820 wrote to memory of 2752 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 29 PID 2820 wrote to memory of 2752 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 29 PID 2820 wrote to memory of 2752 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 29 PID 2820 wrote to memory of 2644 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 31 PID 2820 wrote to memory of 2644 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 31 PID 2820 wrote to memory of 2644 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 31 PID 2820 wrote to memory of 2644 2820 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe 31 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32 PID 2644 wrote to memory of 2512 2644 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe"C:\Users\Admin\AppData\Local\Temp\1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe"C:\Users\Admin\AppData\Local\Temp\1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tojitbdooq.bat" "3⤵
- Deletes itself
PID:2752
-
-
C:\Windows\M-505040927557027642084862846502470750\winmgr.exeC:\Windows\M-505040927557027642084862846502470750\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\M-505040927557027642084862846502470750\winmgr.exeC:\Windows\M-505040927557027642084862846502470750\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD58edad0bfa8181b513dc8298bf3fad7c9
SHA1fecd8fc32983ae99c2a85d211a5524dc1d6ab66c
SHA2560ab8ddb3b1ad3da521b8d7efcfcb916257820841f7634219d2e21a18006c5237
SHA5121a554a1749769495be598d1152731823995a3bd7e9f9ab33144c56a6fbcb4bb06daf6cc34c968ede739cba19ca7504b6051b3960ab93c3decbd56cef26177b7b
-
Filesize
302B
MD58edad0bfa8181b513dc8298bf3fad7c9
SHA1fecd8fc32983ae99c2a85d211a5524dc1d6ab66c
SHA2560ab8ddb3b1ad3da521b8d7efcfcb916257820841f7634219d2e21a18006c5237
SHA5121a554a1749769495be598d1152731823995a3bd7e9f9ab33144c56a6fbcb4bb06daf6cc34c968ede739cba19ca7504b6051b3960ab93c3decbd56cef26177b7b
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
Filesize
337KB
MD5b216e5f4f710a3383c355f738e1cfeff
SHA18ea0c462d67c04935ceb231625a7583d408d78d2
SHA2561f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
SHA512a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311