Analysis
-
max time kernel
154s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
djwa937rJ3uqReA.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
djwa937rJ3uqReA.exe
Resource
win10v2004-20230915-en
General
-
Target
djwa937rJ3uqReA.exe
-
Size
595KB
-
MD5
672ec08e90c7379936773ee5fe3b0431
-
SHA1
a94b7be7b432942b59d4baeb546e8f038f52c290
-
SHA256
fe36ee5707daa891a4902579d1ef2a98d681bf50d87982a1a331432277924365
-
SHA512
7c9b8262c229a2dff2fc31bf3153226651546de7ec7714f4b32404f3ef6bd5dcfab7b7ea2e3736d57bef51f00df493af88896760560a1e0ade2fcd4102ba9814
-
SSDEEP
12288:ev2oj8FwLm/xXe6TfCUOHmPsdIlp8LCujucZ43OJxmxQlU2wFn:euoj8F64XeE9rl4CLs43YQWlU2wFn
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 2900 cmstp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Control Panel\International\Geo\Nation djwa937rJ3uqReA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2780 set thread context of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2632 set thread context of 1192 2632 djwa937rJ3uqReA.exe 13 PID 2632 set thread context of 2900 2632 djwa937rJ3uqReA.exe 31 PID 2900 set thread context of 1192 2900 cmstp.exe 13 -
description ioc Process Key created \Registry\User\S-1-5-21-3185155662-718608226-894467740-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2632 djwa937rJ3uqReA.exe 2900 cmstp.exe 2900 cmstp.exe 2900 cmstp.exe 2900 cmstp.exe 2900 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2632 djwa937rJ3uqReA.exe 1192 Explorer.EXE 1192 Explorer.EXE 2900 cmstp.exe 2900 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2632 djwa937rJ3uqReA.exe Token: SeDebugPrivilege 2900 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 2780 wrote to memory of 2632 2780 djwa937rJ3uqReA.exe 30 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2900 1192 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\djwa937rJ3uqReA.exe"C:\Users\Admin\AppData\Local\Temp\djwa937rJ3uqReA.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\djwa937rJ3uqReA.exe"C:\Users\Admin\AppData\Local\Temp\djwa937rJ3uqReA.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2900
-