Analysis
-
max time kernel
55s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
158b93438a8d54328fef3c117bb59ef7.exe
Resource
win7-20231215-en
General
-
Target
158b93438a8d54328fef3c117bb59ef7.exe
-
Size
5.5MB
-
MD5
158b93438a8d54328fef3c117bb59ef7
-
SHA1
aa24e314910adf064dff33b5106a6dd009e90c45
-
SHA256
179b4678a221ac2bb5059260512515eec9dd7a825287d3f71376b67371fa367b
-
SHA512
30b016d84ff1be67fd15a4cd66b2dec24713507f197a6e0b93dad5c9ff13be6701d4d46162cd0c085e641b5b2a83e42901bd907304fcb4f60bc96465a5c86360
-
SSDEEP
98304:prCupviDxaPqmbS5jR5sG6wKEU/1QoNMvCvzCC2bd6vO6W0GUEcqmdw8yPITd50I:prFpaEPdAN5UpFtlNMv22CCdJEEcqZ8P
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3020 cbd64c377088d953ebf1e4db82c46cba.exe 464 Process not Found 516 cbd64c377088d953ebf1e4db82c46cba.exe -
Loads dropped DLL 29 IoCs
pid Process 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe 1940 158b93438a8d54328fef3c117bb59ef7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira cbd64c377088d953ebf1e4db82c46cba.exe Key opened \REGISTRY\MACHINE\Software\Avira cbd64c377088d953ebf1e4db82c46cba.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe 158b93438a8d54328fef3c117bb59ef7.exe File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\578a48abe209a869ae748b60481c4eba.exe 158b93438a8d54328fef3c117bb59ef7.exe File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\6749fb919d1ffe0307b125fdef28f6d9.exe 158b93438a8d54328fef3c117bb59ef7.exe File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\3956bd468adc5eb0c9847796cd53b33d 158b93438a8d54328fef3c117bb59ef7.exe File opened for modification \??\c:\program files\cbb83586061b9e10795a60573689e6f0\a3c703846464c3b6251be90da7b2703d.exe cbd64c377088d953ebf1e4db82c46cba.exe File created \??\c:\program files\cbb83586061b9e10795a60573689e6f0\c7e1afc570e30ae5325c6002a92401c2\rvcwvw.dll cbd64c377088d953ebf1e4db82c46cba.exe File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\caf69971105ac0602d163aea0a4bdd2a.ico 158b93438a8d54328fef3c117bb59ef7.exe File created C:\Program Files\cbb83586061b9e10795a60573689e6f0\a3c703846464c3b6251be90da7b2703d.exe 158b93438a8d54328fef3c117bb59ef7.exe File created \??\c:\program files\cbb83586061b9e10795a60573689e6f0\c7e1afc570e30ae5325c6002a92401c2\bptsmf.dll cbd64c377088d953ebf1e4db82c46cba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\3045035B-3C14-4698-8AC4-ADB18CC42C1E cbd64c377088d953ebf1e4db82c46cba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\3045035B-3C14-4698-8AC4-ADB18CC42C1E\LocalService = "aba04dd6293773118ceae6b5303847e7" cbd64c377088d953ebf1e4db82c46cba.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 cbd64c377088d953ebf1e4db82c46cba.exe 516 cbd64c377088d953ebf1e4db82c46cba.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeBackupPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe Token: SeSecurityPrivilege 516 cbd64c377088d953ebf1e4db82c46cba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3020 1940 158b93438a8d54328fef3c117bb59ef7.exe 32 PID 1940 wrote to memory of 3020 1940 158b93438a8d54328fef3c117bb59ef7.exe 32 PID 1940 wrote to memory of 3020 1940 158b93438a8d54328fef3c117bb59ef7.exe 32 PID 1940 wrote to memory of 3020 1940 158b93438a8d54328fef3c117bb59ef7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\158b93438a8d54328fef3c117bb59ef7.exe"C:\Users\Admin\AppData\Local\Temp\158b93438a8d54328fef3c117bb59ef7.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe"C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe" --install2⤵
- Executes dropped EXE
- Modifies registry class
PID:3020
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\cbb83586061b9e10795a60573689e6f0" /f /v "DisplayIcon" /t REG_SZ /d "C:\Windows\040a887fa033d510343e0f08c062d079.exe"2⤵PID:2448
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\cbb83586061b9e10795a60573689e6f0" /f /v "UninstallString" /t REG_SZ /d "C:\Windows\040a887fa033d510343e0f08c062d079.exe"2⤵PID:1736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.technologieyvonlheureux.com/index.php?firstrun=1&lp=1&v=d9.67.1.13&tv=1.0-10000&unique_id=AB93F93903D761ADB1013A5225D05686&mid=97b0b903342462c6ba3ccb8e3635b2f0&aid=3673&aid2=none&ts=&ts2=&brw=iexplore&mi=1&ma=62⤵PID:2860
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:23⤵PID:1972
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 .\b9721c3028e87e945e3d889e53daa39d.inf2⤵PID:1664
-
-
C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe"C:\Program Files\cbb83586061b9e10795a60573689e6f0\cbd64c377088d953ebf1e4db82c46cba.exe"1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD50621849d4632bde9379d655932dd9030
SHA14de5773750aaf95e383a413477fe110f02e4c926
SHA2568855eee1f96a76f3b73d9fb11ec5b5c243faf2e8371bc4ab75195345c47cd4bb
SHA5126b07615f6eccac0c4aed927e7bf8260acfd2773bf41dd8a94af96c9a4b2dfdb0f83df77023dc2c7557d311440b0b73b7efc159756595083e22ad20b2df609979
-
Filesize
322KB
MD58758f6b5fd700f4dd0c0d69cc9aef265
SHA13307de92460fbebdede9fb8b28bd90da00ad9b0a
SHA25684103350275636574dad99243f34183392f8b37a14bb4e123caf34c9ffe84b8e
SHA512ac73ec4bd153e762ea466f868303e32a50333f0eefa2f5e3afdccd87c1ae5a00521cbc98c8f4007928ac72c8403f2bc79ae0db70e528f13792dd52c614f1e123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503635da6dd4070575d5a2edb778b6b29
SHA10fef8a3c1c2ab98b5772cc4a594c127eded52555
SHA25658c3bd2477aacda8be4188fa3ee2cbae2f08f9c26a59319236e210a9053c9008
SHA51217963a41b99c72178c1ee3fcbbbeb679ca60e7c4de76ed87c85b9ecfdbfae2e81c7dd27dcc51d767706c7da3db0cb07edacbe5e1d5df2c747601e3c9856da268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f518bd9a884102f999ca388ede2421e4
SHA19c769f9782c6c7a6d4213fbfaa01ed2d6d24931d
SHA256de1977e1be3c4b428049c04ac27d559cd9de3661b343271b15e0a4eb3d25a188
SHA5129cc10488a80628952248a8038af45f404e3dde956416268c6e399eedbad499aa68523abde30fb7aec0dc02785ed56a55bd38429289b9a0d12062e1738ac33c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eabd78bac11067938dd931c640fd58c
SHA100ad93dac695bd84547d8a76340b1342a9931799
SHA256a0872ebf2f5498675ba1b44e83ecc2289f5cf5fc36b2bc9332a7c4552d145d46
SHA51224bf6160557b89d3ddd515df987988858cc508df57d59ea37cc5b073f9c3ec2574eacb14992471fb6dee064ad3feef7454502697d620b045ae2b7cb256e9313a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582b149a66c7d3fd65dee6957569425df
SHA15423cc5c8a47688a68bb2f12669cec434d3afb9c
SHA2561ed5ec2477949e42f58c91a4ee57aa6cc4361d277dfea29d71a9c587fb33f427
SHA5127a34ce60b80c14a9d8d40bb511f684c0e0d4a38b984b32ca6521f3d70960337e998a38aaa78162860de34304196ff57182b3a7acd05144393b935ffe53bbcfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537bd10c29d4a9842d87971f668fe8418
SHA14cb18a41c61433198c85474ef12ed56f2a2f64ad
SHA256d8c6a1e8a436978b79a2b92f0dc5bf3f2ee1d6e51b0adaf9a951356c9c57a504
SHA51261636bffae0e71b327ec0e9f68215aefd8141a074c2a8741c88eec9e0700567ac55ffc2d1eacec25d8bd9c621f9eb80ca3f1fc98907d85dc1cfd18a21d30b8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5359888079d5aa351bc774aa78fda999b
SHA1331b9c5b689bed568efec8daa8960778ac56d555
SHA256d411d5a5060807487eadc0a6eb4debcfa4d72d8af499fcf34bb787764e753b5e
SHA51261dc315e736408954663509aa3d03aaa0a65b87e843827223c72d88fb8ff0ef1df913cf07dc691ff604ecb1791fed288eae57f2db61fe8a8f1479c0a04bedc3e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
115B
MD50487bc1eb50cb0bf26b606c60e81fc96
SHA11631e0bbdeea105d36db86d85f1c355453e8d21e
SHA256d1d9c61c4b6d3f87446166d4870d29a8e80bbadd75b2bdb5bb82ddcde44f0849
SHA512b120a9f8007518770da67bc18ea89dc2d585d8eb91dc21f1f303d207a7cfb12571d0e00bb5ea270bb8fb45c972887685a9d141857aaf8e998baf2ff685e3f000
-
Filesize
72KB
MD5e89c1fbe7111f9358b2f9f11105cf0ac
SHA1fb2de9905a21971fcd165f4617ebf431b9ab5798
SHA256886fe52d45653f63653129a762d4335fe4bc0ea83557a06af575b032635e9e69
SHA512dd9ef96b732c9cf113d051a3f735c41f17bc871306d90382e5d782291de2a3cef000a37b131823b85b7e7ca6a097c6ae51c99cfc357b2f87b086fcb0071b853c
-
Filesize
371KB
MD52f85e633ab9128e52fe79c711cb255e2
SHA192edbb76347f487667965b1ccd7d4f084943677d
SHA256ac58acecdae009a6a415f40b0b4c363966f7c19562da8b3ee7da3d95894acf17
SHA5123152efb96c501d40b3ebe0bfd477a3f6de36b85410b458e038b57934bd882b711ef68ae02c147a3c00b4b4ed2f699231a190fe8df2601421aa6476c6c792843e
-
Filesize
363KB
MD55a45f703efaf80d41ab13bee3b32bcf3
SHA1a6ce4c665c804e78d3557f28bda8e2846e9cc178
SHA2564c2dc40e091dff697d38ab7dcf2bf39cd061569bd8dc8aaa5a45666e34a4aa9d
SHA51253b8c812f49fea01df5caca79e209ebfc82347c4a9f96fd852093702a7b732b2593a5c683624e118ace1970288d90ca61b0f85435f216a550c0dcab8b3842275
-
Filesize
1.8MB
MD52e94b69e71f5a4e72cd864f23c1e6e49
SHA14e038214d68713075789fd80006bf72152426684
SHA256ed6e860d4be50070484a83bd070014a41a9c77400c1dd846b02ed16b9ed9e51b
SHA512a3807466a2c873867e1281775049b5753a89dcf983f7487fbbe42862b2b9e9a2e3872efd1198c511554c50bfcf504bf12978ed6dd07735e6ca646bf59b20865c
-
Filesize
563KB
MD5480311839e180df5d5e9faa688483d32
SHA14d747adf86650189e4d7135d28347b86238f3310
SHA25636d21f5ae455dd3a035d474f56f85c08f28aa4a36ccdea70f5fdc97082d45c70
SHA51245991801e3ce80a4752836eecfe302dabdca06d4e4ddfdcb97d643c67470c097b20cf1f23fb9761dbaa098865323dd5a7893b89c17a39dad5c05018fb09e41ba
-
Filesize
114KB
MD5a3ed6f7ea493b9644125d494fbf9a1e6
SHA1ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8
SHA256ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08
SHA5127099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1
-
Filesize
7KB
MD580e34b7f576b710d100f6e7c0bed0c2e
SHA12b5b895034d41ee0d0d01bf650594ad0d1346662
SHA256569d62345f6c915236772fa2575d1806cd2bfe089505807cb477618f1eeccf99
SHA512f5970c192b7089040fd1cf26e5cab131879b91722dff0216cdc735f9cfde1eda061409b579eb0f11e3b32e5513e34bbedd4050b75bb1b2acc81be814c2c6c59b
-
Filesize
97KB
MD52e0785f18f8714393bc4bc1fe170eadf
SHA11efba431c0fac46c6cb6f60dc08f65a0e23ccf3d
SHA256e68d65626b24e7c1f6fbe1001f43174d0243095181025736f37ad704662f4351
SHA5128a272bb264fa066960a4f34411a81652839eccdbc6fa25be20c0b94d7d10b16cb568338abb5d1a96c155cbc4bc7923d0387fa36bed69c1021296cc6cc5fbb45e
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
549KB
MD53b0c0cf4025ce8b68140f370fc1807ff
SHA1943592e8c26e5744792b0eab2c23ef65938aa22e
SHA256a0f2252c217549e0ae3da6e007b1bd586c150a32635f8bc6a1f45454dd330501
SHA512959beb2a20b2ebf20611118e5c6e46047880b1462412c4efead4ba157601a99192c0abc15c2bf66f77f15334a060a0cc811785782cb9b6d57ec9b408153c9a13
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
8KB
MD597960d7a18662dac9cd80a8c5e3c794b
SHA14c28449cefa9af46bb7a63e9b9ea66a2de0ea287
SHA256e0d1dc6e4c5cc13fb2db08fc741da0d08b315ebc8d3b53baa61552625d19b9c3
SHA5121baab7b5378f3a396b31bf63b01b7905759c9f1d17d71882af63338d64eceda1884c947d93e4d9ef911bded1ef061043c873a88b8272f1aa296731aa745e756c
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe