Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 10:18
Static task
static1
Behavioral task
behavioral1
Sample
16a6955696ef375f1efb1d371cd9928c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16a6955696ef375f1efb1d371cd9928c.exe
Resource
win10v2004-20231215-en
General
-
Target
16a6955696ef375f1efb1d371cd9928c.exe
-
Size
691KB
-
MD5
16a6955696ef375f1efb1d371cd9928c
-
SHA1
bade58018b48d16198e2c2a2d3f2ac18f68104ea
-
SHA256
6d5aa16e97689af6d6464aee85edd7160a929a2f0c351b43104eacd0adf1c042
-
SHA512
53f0bd822576faac72b974bebd6c181784801e72207f00a36a9ec129951b4623c23d855db11446fc1c8f84f16c2e51319c3442df85b118e482982d16ea018101
-
SSDEEP
12288:/K3D4lady90jqe0pOSRhSKmXPi5C6oG5F0bLAUEEwPVot1W96P/qtqNA2:OVdyHjRYB/iww0HfEE/tg8GqN9
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3008 AIDA64~2.EXE 2004 AIDA64~2.EXE 2596 Keygen.exe -
Loads dropped DLL 5 IoCs
pid Process 3008 AIDA64~2.EXE 3008 AIDA64~2.EXE 3008 AIDA64~2.EXE 3008 AIDA64~2.EXE 3008 AIDA64~2.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2596-46-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-51-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-52-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-53-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-54-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-55-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-56-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-57-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-58-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-59-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-60-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-61-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-62-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-63-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-64-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2596-65-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16a6955696ef375f1efb1d371cd9928c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3008 set thread context of 2004 3008 AIDA64~2.EXE 17 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3008 2548 16a6955696ef375f1efb1d371cd9928c.exe 18 PID 2548 wrote to memory of 3008 2548 16a6955696ef375f1efb1d371cd9928c.exe 18 PID 2548 wrote to memory of 3008 2548 16a6955696ef375f1efb1d371cd9928c.exe 18 PID 2548 wrote to memory of 3008 2548 16a6955696ef375f1efb1d371cd9928c.exe 18 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 3008 wrote to memory of 2004 3008 AIDA64~2.EXE 17 PID 2548 wrote to memory of 2596 2548 16a6955696ef375f1efb1d371cd9928c.exe 16 PID 2548 wrote to memory of 2596 2548 16a6955696ef375f1efb1d371cd9928c.exe 16 PID 2548 wrote to memory of 2596 2548 16a6955696ef375f1efb1d371cd9928c.exe 16 PID 2548 wrote to memory of 2596 2548 16a6955696ef375f1efb1d371cd9928c.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a6955696ef375f1efb1d371cd9928c.exe"C:\Users\Admin\AppData\Local\Temp\16a6955696ef375f1efb1d371cd9928c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Keygen.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Keygen.exe2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AIDA64~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AIDA64~2.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3008
-
-
C:\Users\Admin\AppData\Roaming\AIDA64~2.EXEC:\Users\Admin\AppData\Roaming\AIDA64~2.EXE1⤵
- Executes dropped EXE
PID:2004