Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:06
Static task
static1
Behavioral task
behavioral1
Sample
1558f2eaa2baa9e5082ccdb9f723fa7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1558f2eaa2baa9e5082ccdb9f723fa7d.exe
Resource
win10v2004-20231222-en
General
-
Target
1558f2eaa2baa9e5082ccdb9f723fa7d.exe
-
Size
282KB
-
MD5
1558f2eaa2baa9e5082ccdb9f723fa7d
-
SHA1
2593e882e0abf4e1dcb2a6140d20516d00857033
-
SHA256
6f4dfc4f923e53bb1449136b508429332461eb1a082ae3ed6d9630b6e38bc060
-
SHA512
86f42935d2d0b01562a93173357b7af793b7e1ba8b50d8ad353a4b978401261fc3a8b0bfee8391df0c1040793f660a0cc2e1cbc6a04c526c2eca1361dbdd2206
-
SSDEEP
6144:crPraEYF57R69Um+nEY0kqk4PXzCPamiHtRNCI6X:2aXF9R6ym+skK07mKX
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 E080.tmp -
Loads dropped DLL 2 IoCs
pid Process 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1276-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1276-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1276-49-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1276-51-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1844-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1844-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2536-141-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1276-140-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1276-214-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\56A.exe = "C:\\Program Files (x86)\\LP\\A45A\\56A.exe" 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\A45A\56A.exe 1558f2eaa2baa9e5082ccdb9f723fa7d.exe File opened for modification C:\Program Files (x86)\LP\A45A\56A.exe 1558f2eaa2baa9e5082ccdb9f723fa7d.exe File opened for modification C:\Program Files (x86)\LP\A45A\E080.tmp 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2780 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 3040 msiexec.exe Token: SeTakeOwnershipPrivilege 3040 msiexec.exe Token: SeSecurityPrivilege 3040 msiexec.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1844 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 32 PID 1276 wrote to memory of 1844 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 32 PID 1276 wrote to memory of 1844 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 32 PID 1276 wrote to memory of 1844 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 32 PID 1276 wrote to memory of 2572 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 35 PID 1276 wrote to memory of 2572 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 35 PID 1276 wrote to memory of 2572 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 35 PID 1276 wrote to memory of 2572 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 35 PID 1276 wrote to memory of 2536 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 36 PID 1276 wrote to memory of 2536 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 36 PID 1276 wrote to memory of 2536 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 36 PID 1276 wrote to memory of 2536 1276 1558f2eaa2baa9e5082ccdb9f723fa7d.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1558f2eaa2baa9e5082ccdb9f723fa7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 1558f2eaa2baa9e5082ccdb9f723fa7d.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exe"C:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exeC:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exe startC:\Users\Admin\AppData\Roaming\AB7EF\B52A4.exe%C:\Users\Admin\AppData\Roaming\AB7EF2⤵PID:1844
-
-
C:\Program Files (x86)\LP\A45A\E080.tmp"C:\Program Files (x86)\LP\A45A\E080.tmp"2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exeC:\Users\Admin\AppData\Local\Temp\1558f2eaa2baa9e5082ccdb9f723fa7d.exe startC:\Program Files (x86)\EFDE9\lvvm.exe%C:\Program Files (x86)\EFDE92⤵PID:2536
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54dd42b868444207ad8503625cc0f904c
SHA18ab1880b1e8f724b38943095c4885a1a2bcc30d2
SHA256982900b504c7f3f0508d2b16eacbd95da47514269499b549dcd1ade0eabd7f55
SHA5124f93bbc2eebebe49b3c062fb7d6a41cb6dc8cf4ce4ac0d74917cfb9dc47264f402c29b8949ec3229efcf9ee61a518c460929bf284be3afd5d4a6d4a54cf5b74f
-
Filesize
600B
MD5ff14fa828fc01102547264fed96cf8f3
SHA1a1bb5bf7a7285cf4f3f0e3449561464e69f45b2e
SHA2565789da84891be215e55dcafcd3a7d2f1f4338571ac6393129f7c66bea5e2e63f
SHA5124ca1c9fc932e24153b715b4bc2a32ac8ce1c6ccd0faec079aa36aabd8720d5541c280e7a3a9c7b35a76bca68733c981099c69367075395448357f69b2ed8b85e
-
Filesize
1KB
MD5ac401fd972204383791bdac49258f445
SHA173291f305a8c142c333d42b60a93e955c28fcf93
SHA256c02527a80f777a4e474479a6eb2b695da95ff112c3680a52e81a0ba552e08fa6
SHA51201568ac6ebf60b4f1893ae03b8aa1496b149802233e999da845e0efc969865048a1f4e48733765d584d1263ad88698d4fcb60b12d8790f552e422706babd115c
-
Filesize
897B
MD53932981bf77b2cf16d525eecb5ab13fa
SHA17e57dbc093836c0028570a9586d606461f896ef3
SHA256213f3875c96631ccd1d52724dbbdc6acc9a32453076f5ecb7de41ddf93d11c80
SHA512f5f70abff35134beb4aebdd0a036dbc630f39c0995367837e6dc1c9fa7a4be119085874e93e4ac492cbe6618f9ee8f0726b3a867a7baef3b211c984ec4ced281
-
Filesize
99KB
MD59d83b6d4629b9d0e96bbdb171b0dc5db
SHA1e9bed14c44fe554e0e8385096bbacca494da30b1
SHA256d3a6060ff059a7724a483d82025a9231a61143839b633a6d3842a58ccb5a7d7d
SHA512301187bdcab5ca9942b2c7b7114e37e53e58b5661eef50c389622950d7691993a29f5a825132cf499ca73cdb6637d3f58afdc024cb04fac2b8e01f752209572c