Analysis
-
max time kernel
35s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
7d8e4f6c49c0d7646075802484be99ec.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d8e4f6c49c0d7646075802484be99ec.exe
Resource
win10v2004-20231215-en
General
-
Target
7d8e4f6c49c0d7646075802484be99ec.exe
-
Size
372KB
-
MD5
7d8e4f6c49c0d7646075802484be99ec
-
SHA1
2bba7a745133c7766f402274cd893233d860adaa
-
SHA256
6da538f334fe6439a1915d69489fcce17a2f23be109e4dbb5820481d1a45a780
-
SHA512
bf7e32aa2df7b8b2e6a8fe5101619feb4ea694f82e8a4f1dc54dc96b75d01b3e84dacd0c3a45d8c99bf827c06b139001061acf163814415ab2f7a6aa94cc444d
-
SSDEEP
6144:4C9n5C4GloiqpNoc8bb+SGPi09J4K4VZeDcAPJic9Uem:4C9n5C4fXp+c8bbsfAPVUZJic9zm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1140 takeown.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1140 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/568-1-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/568-9-0x0000000000400000-0x000000000045E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{43AED944-51FA-9D6E-5832-2754B99FD772} = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\eypn1lcs.default-release\\storage\\permanent\\chrome\\idb\\3870112724rsegmnoittet-es.files\\DWWIN.EXE" 7d8e4f6c49c0d7646075802484be99ec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1280 1140 WerFault.exe 91 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7d8e4f6c49c0d7646075802484be99ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7d8e4f6c49c0d7646075802484be99ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 7d8e4f6c49c0d7646075802484be99ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 takeown.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString takeown.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz takeown.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" takeown.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" takeown.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main takeown.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe 568 7d8e4f6c49c0d7646075802484be99ec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1140 takeown.exe Token: SeDebugPrivilege 3932 help.exe Token: SeDebugPrivilege 1760 ftp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 568 wrote to memory of 1140 568 7d8e4f6c49c0d7646075802484be99ec.exe 91 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 3932 1140 takeown.exe 98 PID 1140 wrote to memory of 232 1140 takeown.exe PID 1140 wrote to memory of 232 1140 takeown.exe PID 1140 wrote to memory of 1280 1140 takeown.exe 102 PID 1140 wrote to memory of 1280 1140 takeown.exe 102 PID 3932 wrote to memory of 1760 3932 help.exe 106 PID 3932 wrote to memory of 1760 3932 help.exe 106 PID 3932 wrote to memory of 1760 3932 help.exe 106 PID 3932 wrote to memory of 1760 3932 help.exe 106 PID 3932 wrote to memory of 1760 3932 help.exe 106 PID 3932 wrote to memory of 1760 3932 help.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8e4f6c49c0d7646075802484be99ec.exe"C:\Users\Admin\AppData\Local\Temp\7d8e4f6c49c0d7646075802484be99ec.exe"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe2⤵
- Deletes itself
- Modifies file permissions
- Checks processor information in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\help.exeC:\Windows\System32\help.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\System32\ftp.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 13083⤵
- Program crash
PID:1280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1140 -ip 11401⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\eypn1lcs.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\DWWIN.EXE
Filesize372KB
MD57d8e4f6c49c0d7646075802484be99ec
SHA12bba7a745133c7766f402274cd893233d860adaa
SHA2566da538f334fe6439a1915d69489fcce17a2f23be109e4dbb5820481d1a45a780
SHA512bf7e32aa2df7b8b2e6a8fe5101619feb4ea694f82e8a4f1dc54dc96b75d01b3e84dacd0c3a45d8c99bf827c06b139001061acf163814415ab2f7a6aa94cc444d