Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05/10/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe
Resource
win7-20230831-en
General
-
Target
d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe
-
Size
286KB
-
MD5
9ee1ffdcdb9d3e7a492761bef286d23c
-
SHA1
125828f1e5efc3c2c0bf4033e0d8823749d72f9e
-
SHA256
d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66
-
SHA512
4f5ef7f422341b5b4ce93e1ccf40bf073eda841ecae3952b444076afbb7bd97c9fda9ab2cc12b98587cf92fd87f7fc6c5c6e0af45a2f6048fa31ddf601d63825
-
SSDEEP
6144:EObeyJ8pXyQ5HhoegxaaIhUjFBgTxq3nQwfX7/QmB/txFwJV:EObr8RyQ5yQaiuFO83nQC0r
Malware Config
Extracted
stealc
http://aidandylan.top
-
url_path
/3886d2276f6914c4.php
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 2080 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 6305253244.exe -
Loads dropped DLL 2 IoCs
pid Process 2600 cmd.exe 2600 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6305253244.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6305253244.exe -
Kills process with taskkill 1 IoCs
pid Process 2144 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2504 6305253244.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2600 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 32 PID 1948 wrote to memory of 2600 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 32 PID 1948 wrote to memory of 2600 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 32 PID 1948 wrote to memory of 2600 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 32 PID 2600 wrote to memory of 2504 2600 cmd.exe 34 PID 2600 wrote to memory of 2504 2600 cmd.exe 34 PID 2600 wrote to memory of 2504 2600 cmd.exe 34 PID 2600 wrote to memory of 2504 2600 cmd.exe 34 PID 1948 wrote to memory of 2080 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 36 PID 1948 wrote to memory of 2080 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 36 PID 1948 wrote to memory of 2080 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 36 PID 1948 wrote to memory of 2080 1948 d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe 36 PID 2080 wrote to memory of 2144 2080 cmd.exe 38 PID 2080 wrote to memory of 2144 2080 cmd.exe 38 PID 2080 wrote to memory of 2144 2080 cmd.exe 38 PID 2080 wrote to memory of 2144 2080 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6305253244.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\6305253244.exe"C:\Users\Admin\AppData\Local\Temp\6305253244.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d0c12de8d2a6fbe5508aee9868550ec7927270bf824d0151e01cc7e6f01bbc66exe_JC.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5042fe40a9dc436330754e183ac2b0b55
SHA1397fd6687e026d09535ba00c7fabe6406eca7093
SHA25660105053a8c43d3f3f63291c04e5485f938564f995cde262eb2014cf5d319208
SHA512e7087eb45609180a18a21f9911feadbc196b1844d3a6d737e20e156cfb6e34daf06cdd6472ad610dc7ce3efdb6ec99a2098f08b23a68582e44759e44a572de19
-
Filesize
202KB
MD5042fe40a9dc436330754e183ac2b0b55
SHA1397fd6687e026d09535ba00c7fabe6406eca7093
SHA25660105053a8c43d3f3f63291c04e5485f938564f995cde262eb2014cf5d319208
SHA512e7087eb45609180a18a21f9911feadbc196b1844d3a6d737e20e156cfb6e34daf06cdd6472ad610dc7ce3efdb6ec99a2098f08b23a68582e44759e44a572de19
-
Filesize
202KB
MD5042fe40a9dc436330754e183ac2b0b55
SHA1397fd6687e026d09535ba00c7fabe6406eca7093
SHA25660105053a8c43d3f3f63291c04e5485f938564f995cde262eb2014cf5d319208
SHA512e7087eb45609180a18a21f9911feadbc196b1844d3a6d737e20e156cfb6e34daf06cdd6472ad610dc7ce3efdb6ec99a2098f08b23a68582e44759e44a572de19
-
Filesize
202KB
MD5042fe40a9dc436330754e183ac2b0b55
SHA1397fd6687e026d09535ba00c7fabe6406eca7093
SHA25660105053a8c43d3f3f63291c04e5485f938564f995cde262eb2014cf5d319208
SHA512e7087eb45609180a18a21f9911feadbc196b1844d3a6d737e20e156cfb6e34daf06cdd6472ad610dc7ce3efdb6ec99a2098f08b23a68582e44759e44a572de19