Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 14:53
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
b96f6d54cc6c0fc6f70780565e946814
-
SHA1
c6fd19cc433ce18cfd5b0398ce352a1b22dd8c6e
-
SHA256
a151dc5591395591d37f55a184a3b9f37e1ea1065ad7acdc2ad88b73654e8719
-
SHA512
5002ed9e77976addb42ec7952d3b238c8859b24008508b370c073c5a4b07e08372f920e2343da3b914bd486cab02562c979c8ef87eae4a8269a99ae7e4be61db
-
SSDEEP
49152:WPTsqPj9RbRiltgiDMTxr0mAXPst17yNVmliif:W7/RbRizgiD4oukVmlii
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 212 towardlowestpro.exe 1308 towardlowest.exe 640 towardlowest.exe 4080 towardlowest.exe 1744 towardllowest.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" towardlowestpro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 4080 1308 towardlowest.exe 100 -
Delays execution with timeout.exe 1 IoCs
pid Process 632 timeout.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1308 towardlowest.exe 1308 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe 4080 towardlowest.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1308 towardlowest.exe Token: SeDebugPrivilege 1744 towardllowest.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4140 wrote to memory of 212 4140 file.exe 85 PID 4140 wrote to memory of 212 4140 file.exe 85 PID 212 wrote to memory of 1308 212 towardlowestpro.exe 86 PID 212 wrote to memory of 1308 212 towardlowestpro.exe 86 PID 212 wrote to memory of 1308 212 towardlowestpro.exe 86 PID 1308 wrote to memory of 640 1308 towardlowest.exe 99 PID 1308 wrote to memory of 640 1308 towardlowest.exe 99 PID 1308 wrote to memory of 640 1308 towardlowest.exe 99 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 1308 wrote to memory of 4080 1308 towardlowest.exe 100 PID 212 wrote to memory of 1744 212 towardlowestpro.exe 101 PID 212 wrote to memory of 1744 212 towardlowestpro.exe 101 PID 4080 wrote to memory of 4276 4080 towardlowest.exe 103 PID 4080 wrote to memory of 4276 4080 towardlowest.exe 103 PID 4080 wrote to memory of 4276 4080 towardlowest.exe 103 PID 4276 wrote to memory of 632 4276 cmd.exe 105 PID 4276 wrote to memory of 632 4276 cmd.exe 105 PID 4276 wrote to memory of 632 4276 cmd.exe 105 PID 4276 wrote to memory of 4884 4276 cmd.exe 106 PID 4276 wrote to memory of 4884 4276 cmd.exe 106 PID 4276 wrote to memory of 4884 4276 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\towardlowestpro.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\towardlowestpro.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe4⤵
- Executes dropped EXE
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout /nobreak /t 3 & fsutil file setZeroData offset=0 length=1516543 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe" & erase "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe" & exit5⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 36⤵
- Delays execution with timeout.exe
PID:632
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=1516543 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardlowest.exe"6⤵PID:4884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardllowest.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\towardllowest.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56aa63c3dc744651713d43fd6ddb23844
SHA12cd7783caab23497fa09b2d506b45eca541d01f9
SHA256dacc8488793b931ef6f4f71e5b90601b7957e5e6d5983f798a24f4fa0bee4891
SHA512950dec063537810d47c254951c151d8c58d9139d08240d521b46ab27e1039ec066acaee79b59ed07d88d5852b5b181b7760dd94fb0b271caaa005ed745b1f558
-
Filesize
1.4MB
MD527d1dfbd6cf71a13d6f864f443a274e1
SHA11d39b29938b248715725ceabbdf968821cfa27b4
SHA25695d725e3e85908eb0c77d2c1b6c349dea2b37e6d7f23436b288155aab4131ff3
SHA5125bfb4370f67fbceb4e61b6794c0db0a3a9ba7f154fa4d3cc6d9fd378c2a6142d225aa7626b0c73173262e87df9c6744a41d184fea4077040b4f942a4d90665fa
-
Filesize
1.4MB
MD527d1dfbd6cf71a13d6f864f443a274e1
SHA11d39b29938b248715725ceabbdf968821cfa27b4
SHA25695d725e3e85908eb0c77d2c1b6c349dea2b37e6d7f23436b288155aab4131ff3
SHA5125bfb4370f67fbceb4e61b6794c0db0a3a9ba7f154fa4d3cc6d9fd378c2a6142d225aa7626b0c73173262e87df9c6744a41d184fea4077040b4f942a4d90665fa
-
Filesize
1.4MB
MD55fa200d9138c209425068a30b3110293
SHA19d03602c20c7af02fd4f4675d5d4a6cb6af0a64b
SHA256b8c161d15088720da62261b1f5e0f75a87c3509f2350425a1d6baf366e63557a
SHA51233d2eadc475f375370d55f6cdcbff4799e7eb45b2d793bfeac2f3a45fd48a3b7e3834b50b52ac9bbb74acc2054b1f16293b825e262b37199c7fbd4d7a14dd4be
-
Filesize
1.4MB
MD55fa200d9138c209425068a30b3110293
SHA19d03602c20c7af02fd4f4675d5d4a6cb6af0a64b
SHA256b8c161d15088720da62261b1f5e0f75a87c3509f2350425a1d6baf366e63557a
SHA51233d2eadc475f375370d55f6cdcbff4799e7eb45b2d793bfeac2f3a45fd48a3b7e3834b50b52ac9bbb74acc2054b1f16293b825e262b37199c7fbd4d7a14dd4be
-
Filesize
1.4MB
MD55fa200d9138c209425068a30b3110293
SHA19d03602c20c7af02fd4f4675d5d4a6cb6af0a64b
SHA256b8c161d15088720da62261b1f5e0f75a87c3509f2350425a1d6baf366e63557a
SHA51233d2eadc475f375370d55f6cdcbff4799e7eb45b2d793bfeac2f3a45fd48a3b7e3834b50b52ac9bbb74acc2054b1f16293b825e262b37199c7fbd4d7a14dd4be
-
Filesize
1.4MB
MD55fa200d9138c209425068a30b3110293
SHA19d03602c20c7af02fd4f4675d5d4a6cb6af0a64b
SHA256b8c161d15088720da62261b1f5e0f75a87c3509f2350425a1d6baf366e63557a
SHA51233d2eadc475f375370d55f6cdcbff4799e7eb45b2d793bfeac2f3a45fd48a3b7e3834b50b52ac9bbb74acc2054b1f16293b825e262b37199c7fbd4d7a14dd4be