Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
353973888175ed3a55b55bbb9caa705d.exe
Resource
win7-20231129-en
General
-
Target
353973888175ed3a55b55bbb9caa705d.exe
-
Size
936KB
-
MD5
353973888175ed3a55b55bbb9caa705d
-
SHA1
a62386a85101098a94d61588dd716f1ebbf00be0
-
SHA256
e4e367cdf3bd051008317a99681f3d5bef1082f52083357cc0480ab9a317493b
-
SHA512
65c504d719efc98b625f145c6ecfecf4e019d12bc77a1bd3b1d1c050dc1d4eef079fd999d2d6f1d4fa2cfa543457c679ff57a4c0b560d68a3805e8531d933918
-
SSDEEP
24576:0i98nUfykkc+ddd9IKr2bCPDf/9U7yGzlUUqmgxYtKQodW8Pz:0DnUfyWqjIRb2D39iyuxgxYt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 353973888175ed3a55b55bbb9caa705d.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation original.exe -
Executes dropped EXE 3 IoCs
pid Process 2392 original.exe 4524 original.exe 3132 FaceBookPokerHack.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000800000001e712-7.dat upx behavioral2/memory/2392-15-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2392-23-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 4524 2392 original.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 original.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2392 1236 353973888175ed3a55b55bbb9caa705d.exe 90 PID 1236 wrote to memory of 2392 1236 353973888175ed3a55b55bbb9caa705d.exe 90 PID 1236 wrote to memory of 2392 1236 353973888175ed3a55b55bbb9caa705d.exe 90 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 2392 wrote to memory of 4524 2392 original.exe 94 PID 4524 wrote to memory of 3132 4524 original.exe 95 PID 4524 wrote to memory of 3132 4524 original.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\353973888175ed3a55b55bbb9caa705d.exe"C:\Users\Admin\AppData\Local\Temp\353973888175ed3a55b55bbb9caa705d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\original.exe"C:\Users\Admin\AppData\Local\Temp\original.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\original.exe
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\FaceBookPokerHack.exe"C:\Users\Admin\AppData\Roaming\FaceBookPokerHack.exe"4⤵
- Executes dropped EXE
PID:3132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5a7e03f76f236d52fabab95062a952425
SHA1b23a9109dfb0c3ea29bfd970ad5da06e8ae8969c
SHA256528c9ee89796f9e3ba233c46065c18f0ddfed428fe80d12269b156494b680234
SHA5121dd531130bcdb0f20183cb818cfed25ceee997ce28a465bfa68a843deb0d7cc8aa0779ff3038eec1bc09787d37e660eea2574d265fcefd1d954e7f4c73f78eec
-
Filesize
405KB
MD5d235f5807f24bb4ff3b1e20ee3911d14
SHA147d665feeb0fdc947c5481dee325fa2a9f0e0d80
SHA2560a78fcc9494591ab75b8b93889d1755829b2aa030626b1b350cc2bef04b297eb
SHA5126c1ff98ee7fd6cb4df2ac264657d34f3b18b554b2520789206e41f422bbc4587c7c32dfd76870aa9ce646838db45a67bb9a2dd6406129887e020cbcbf7bcd024
-
Filesize
381KB
MD51ae3ae81ec49df2f916e881f2c8f8d5b
SHA1aae7a9f8491cb6655d12c465895a6478fb0e7222
SHA2566730237d3094785cfd59df5ee337d57ce6729191422053f4d52be4209caf0c62
SHA512d054666d00a15ca6765ec275f0b627859f4ac7dc83ae2efa1dfe36b7515911ad2e31741742d49f1dd2c46a5f6ec23be974bd599e161389c2756bfbdfdebba3af