Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-10-2023 08:41
Static task
static1
Behavioral task
behavioral1
Sample
PO2023.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PO2023.exe
Resource
win10v2004-20230915-en
General
-
Target
PO2023.exe
-
Size
588KB
-
MD5
a98108f853d463f53cbf9d387939a355
-
SHA1
3a247e03235c86730326f68319248d38b1a83531
-
SHA256
15721ae2d04e5e9d1b9d49821e87cf5007bee2ba0b4306f5e6d0d190f2591759
-
SHA512
2cc43621d9eb78e3b01fe06b11031853c3472a9d3b7c9fe00813952f364a03d21778d0e56dc16c045770ea07abc9065b80669a3444643f19b5fd94bed0eba3b0
-
SSDEEP
12288:tawpe2SdqfYdxy1KhF5wZKvg7qNZfK3Gwwfe/7rM4VWjbH:tawpe2Sdqgm1AmFMZksf03kjbH
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\YXMWabc = "C:\\Users\\Admin\\AppData\\Roaming\\YXMWabc\\YXMWabc.exe" PO2023.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2528 2988 PO2023.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 PO2023.exe 2528 PO2023.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 PO2023.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 PO2023.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2572 2988 PO2023.exe 30 PID 2988 wrote to memory of 2572 2988 PO2023.exe 30 PID 2988 wrote to memory of 2572 2988 PO2023.exe 30 PID 2988 wrote to memory of 2572 2988 PO2023.exe 30 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32 PID 2988 wrote to memory of 2528 2988 PO2023.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO2023.exe"C:\Users\Admin\AppData\Local\Temp\PO2023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SAHcZQmqokCyT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp31C.tmp"2⤵
- Creates scheduled task(s)
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\PO2023.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8719fd13f41a2a3406f968d3ba22e1c
SHA12810ee783df546be6531f6d1feb606f780c5d01f
SHA256d82872da272a8809c2548ee3158ea72ad63a2825f411069e666e22f289c46172
SHA512d643dbc90eb0bb90294a6e9a1f9a558d6fd62603d98fb94f2b3d923173284f800122ed5dfd232a3bff8ffbdc5d9257435685dae9a3fd2bd8e036a365f38f15b6