Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:59
Static task
static1
Behavioral task
behavioral1
Sample
39cf6e9031d56565d1495814e66c401b.exe
Resource
win7-20231215-en
General
-
Target
39cf6e9031d56565d1495814e66c401b.exe
-
Size
122KB
-
MD5
39cf6e9031d56565d1495814e66c401b
-
SHA1
4c5d591c9f514d9637da004cf1ff46090a2403e7
-
SHA256
8fd23e0eb4cf2b6ce6220b6436f1c4e3ee3956de8833954a8538298b5ed95848
-
SHA512
1c1a7afbff566f4946490b13b5cdb6513b3c1d725314051f55b2147181a7bb7cc41db5165a9f4244173556e1303049a44d68db989bb2fb4c90bc9c73b8b93b2b
-
SSDEEP
1536:s+DN+aMm+vVd6tRqaR30SYakNtShB9lqJ+JGXzVtWe45WMW:FN+y+baMsB9lGqGXz4Q
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39cf6e9031d56565d1495814e66c401b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39cf6e9031d56565d1495814e66c401b.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39cf6e9031d56565d1495814e66c401b.exe 39cf6e9031d56565d1495814e66c401b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39cf6e9031d56565d1495814e66c401b.exe 39cf6e9031d56565d1495814e66c401b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports 39cf6e9031d56565d1495814e66c401b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports\NO_PWDS_report_26-12-2023_18-59-29-63686EB9-HLON.bin 39cf6e9031d56565d1495814e66c401b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports\NO_PWDS_report_26-12-2023_18-59-29-63686EB9-HLON.bin 39cf6e9031d56565d1495814e66c401b.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 39cf6e9031d56565d1495814e66c401b.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 39cf6e9031d56565d1495814e66c401b.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 whatismyip.akamai.com -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 39cf6e9031d56565d1495814e66c401b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 39cf6e9031d56565d1495814e66c401b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 39cf6e9031d56565d1495814e66c401b.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2880 39cf6e9031d56565d1495814e66c401b.exe 2880 39cf6e9031d56565d1495814e66c401b.exe 2880 39cf6e9031d56565d1495814e66c401b.exe 1152 39cf6e9031d56565d1495814e66c401b.exe 1152 39cf6e9031d56565d1495814e66c401b.exe 1152 39cf6e9031d56565d1495814e66c401b.exe 1152 39cf6e9031d56565d1495814e66c401b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1152 2880 39cf6e9031d56565d1495814e66c401b.exe 27 PID 2880 wrote to memory of 1152 2880 39cf6e9031d56565d1495814e66c401b.exe 27 PID 2880 wrote to memory of 1152 2880 39cf6e9031d56565d1495814e66c401b.exe 27 PID 2880 wrote to memory of 1152 2880 39cf6e9031d56565d1495814e66c401b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\39cf6e9031d56565d1495814e66c401b.exe"C:\Users\Admin\AppData\Local\Temp\39cf6e9031d56565d1495814e66c401b.exe"1⤵
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39cf6e9031d56565d1495814e66c401b.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39cf6e9031d56565d1495814e66c401b.exe"2⤵
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports\NO_PWDS_report_26-12-2023_18-59-29-63686EB9-HLON.bin
Filesize1KB
MD5f41e88e4f53a2f1a066ba106984f9706
SHA14733a3c5ac447056b41bf07f4ef4b38d42be02d5
SHA25608a5085a8aae6d96ee6055db0e3fa900f34725ac8d04b428056697ac9d47827f
SHA5127d2af1da09085aeaab06f02c4213fa71c1d72277090e942a59e3ef2eb63fc1d05e93a46dd2a63efaaa2a92218763c6b76370bb5afeed39143847722d1f04d1d1
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\39cf6e9031d56565d1495814e66c401b.exe
Filesize122KB
MD539cf6e9031d56565d1495814e66c401b
SHA14c5d591c9f514d9637da004cf1ff46090a2403e7
SHA2568fd23e0eb4cf2b6ce6220b6436f1c4e3ee3956de8833954a8538298b5ed95848
SHA5121c1a7afbff566f4946490b13b5cdb6513b3c1d725314051f55b2147181a7bb7cc41db5165a9f4244173556e1303049a44d68db989bb2fb4c90bc9c73b8b93b2b