Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
10/12/2023, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231201-en
General
-
Target
file.exe
-
Size
333KB
-
MD5
e99cedc3bb79683a0f8a65caff96f39e
-
SHA1
ada0722d447c76e7f23068d7de7d399bda407b1e
-
SHA256
4887da8b043331a43f0b0a3d9881abae2289cfaa8655bf34aec7b7474190822e
-
SHA512
4d7da6297335130b7bbe07db59f1c4d62482ba0fb16604326bc2db5993cb2b17d040f9b4ed5beb029cb4cd5f1a539acaab5a92bcc3ee1eef43e318b72c7768c8
-
SSDEEP
3072:erZzIJ9jHKfx3JlX7AETp4qAaTo8dRDv8wNlTmtmiVElHRZDU6i+j3wOrNd+7xxK:yFIyJX7lTp4/aVRdssLDU3+jJN2
Malware Config
Extracted
stealc
http://5.42.64.41
-
url_path
/40d570f44e84a454.php
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 file.exe 1648 file.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2612 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1648 file.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3008 1648 file.exe 29 PID 1648 wrote to memory of 3008 1648 file.exe 29 PID 1648 wrote to memory of 3008 1648 file.exe 29 PID 1648 wrote to memory of 3008 1648 file.exe 29 PID 3008 wrote to memory of 2612 3008 cmd.exe 31 PID 3008 wrote to memory of 2612 3008 cmd.exe 31 PID 3008 wrote to memory of 2612 3008 cmd.exe 31 PID 3008 wrote to memory of 2612 3008 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\file.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5d298031eff7e795989b01df215000ee6
SHA12f33c3d02bb9013cc4b0073b96438030627224c6
SHA25635283de8809b7869a04827395af270201fc1763aee46cd0c602b2039d2bb30e1
SHA512836ab24684917adec1e9c81eb944fb21b0b8815c3e392e5579676dcc25359d4cb19c56fb2990cbfbe606db47f9541ae51ecc685ccb8cf976b5b9e4e22258efa2
-
Filesize
224KB
MD5eb7d597759d4f0b93a5662b1609bf5bf
SHA180acc03ffd1c7d243606acbeed2a47577c9fddb8
SHA2569332920c513d6c16124d4dcce54fb572ceb279b360bf7d386cbdfda754339412
SHA512afefc25a5efb4c87be3ae203a6b982150a58ca9608fcaa676851281e0473caa3fd642d9918a04c08e105039161e7b6cd0fda578ce5f3ace6838e47b3dd76abc0