Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
33d44212038eff8013d649cae7aa9253.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
33d44212038eff8013d649cae7aa9253.exe
Resource
win10v2004-20231222-en
General
-
Target
33d44212038eff8013d649cae7aa9253.exe
-
Size
174KB
-
MD5
33d44212038eff8013d649cae7aa9253
-
SHA1
2aeb195ebfde711b1301cc9e8d7f6e9ef3ad7d87
-
SHA256
99c86fe1943b34d49b98f320082bcc9be8e9a0a24280ea5bdf839c724b2b8f86
-
SHA512
9e56e49329da0057ff9229835c681a86769548389823824c701411cc9a05ed1971c88fe8723fd55d4b6727a06e9f7f9a9940971317381c758e35cfdbc75681cc
-
SSDEEP
3072:c65j3B+CNfYzPvvZ88gCH+S5/946iRBbs7qe756xNcvCupCkkYbJKog6NSLkVF1H:cS2zvZ8z43wRBbsGky7zsVF1IL+tWB
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 33d44212038eff8013d649cae7aa9253.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2192-1-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1948-13-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2192-12-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2192-15-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2304-75-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/2192-91-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1948-183-0x00000000004E0000-0x00000000005E0000-memory.dmp upx behavioral1/memory/2192-185-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\00A.exe = "C:\\Program Files (x86)\\LP\\F171\\00A.exe" 33d44212038eff8013d649cae7aa9253.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\F171\00A.exe 33d44212038eff8013d649cae7aa9253.exe File opened for modification C:\Program Files (x86)\LP\F171\CC25.tmp 33d44212038eff8013d649cae7aa9253.exe File opened for modification C:\Program Files (x86)\LP\F171\00A.exe 33d44212038eff8013d649cae7aa9253.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe 2192 33d44212038eff8013d649cae7aa9253.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2032 msiexec.exe Token: SeTakeOwnershipPrivilege 2032 msiexec.exe Token: SeSecurityPrivilege 2032 msiexec.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1948 2192 33d44212038eff8013d649cae7aa9253.exe 30 PID 2192 wrote to memory of 1948 2192 33d44212038eff8013d649cae7aa9253.exe 30 PID 2192 wrote to memory of 1948 2192 33d44212038eff8013d649cae7aa9253.exe 30 PID 2192 wrote to memory of 1948 2192 33d44212038eff8013d649cae7aa9253.exe 30 PID 2192 wrote to memory of 2304 2192 33d44212038eff8013d649cae7aa9253.exe 32 PID 2192 wrote to memory of 2304 2192 33d44212038eff8013d649cae7aa9253.exe 32 PID 2192 wrote to memory of 2304 2192 33d44212038eff8013d649cae7aa9253.exe 32 PID 2192 wrote to memory of 2304 2192 33d44212038eff8013d649cae7aa9253.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 33d44212038eff8013d649cae7aa9253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 33d44212038eff8013d649cae7aa9253.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exe"C:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exeC:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exe startC:\Users\Admin\AppData\Roaming\15AB0\176F1.exe%C:\Users\Admin\AppData\Roaming\15AB02⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exeC:\Users\Admin\AppData\Local\Temp\33d44212038eff8013d649cae7aa9253.exe startC:\Program Files (x86)\B0F4E\lvvm.exe%C:\Program Files (x86)\B0F4E2⤵PID:2304
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5701e981cbc83d38ff76e23e9872b8b59
SHA1481dbd87cb51a7b246f9cdacc858a30916822714
SHA2562b537204057d8efdaf96b5c3d4529500595517c3758054b593d9e4a42abba40d
SHA5125d4fc09e3f8f476c5c0f90f82b8d23c15aeb2ccf5e7971d8faf345d04415760ad1cd83caa958d60023e8b615b62cf5e78767ebb849fc50c6e449880264e5a6bd
-
Filesize
1KB
MD53da0e321efa3f3274d0ec9e020dcf0b3
SHA1901fcde2a35c4f9d95a0cee61bc46583ef690310
SHA256b5e8a837e534136e8e3d6e61bf4c3ed9f2682a0cc1fcd4355dbce85baf8dcf4d
SHA512db0c7d90768622e1ebfd73e2beb10625fe20336d0b14195f05e14a38fda51f0f8218e45c3e3d3734097c8466354bac03be9893ad0c628fc19732f57eb9b19896
-
Filesize
996B
MD53ce5a9ba0c0e403f6fcdaa3592f47f57
SHA14b49b1879b38fcc6c9c53f2f8083fdc0767b22ef
SHA256934254644cc2c7e26b167154bb8201beda77542db1cec3cfbe21f241c9baf617
SHA512c5602e24af5ea4c8a7645a6c3d9c58660f297183e8bea7839da9c038151199a2ef3aecbbcf8b6fc1a89c0f7f937794ba3cf7734e8e9c274131b78559e27f10e1
-
Filesize
1KB
MD5a7fe413e31e9a66a22d97601173b8979
SHA1f803d3e581e246966948deeac85938ada1020ea5
SHA256515305eef1987773f806579b927ade0b7c94904273fa551600b6c754fa95319f
SHA512dc30804cd4dba96cb1c466a2ea7c2695b847506954ac2b4cda9a3d1b57cd953e58874dc8477ea04843af53303830a454cccb7c853c75f41c72b7b11bcf096aa8