Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
1c1ff790794298309fc6d52e6cda4131.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c1ff790794298309fc6d52e6cda4131.exe
Resource
win10v2004-20231215-en
General
-
Target
1c1ff790794298309fc6d52e6cda4131.exe
-
Size
339KB
-
MD5
1c1ff790794298309fc6d52e6cda4131
-
SHA1
bbc17b40f69ff0c123fedcbf9cc9538e600634f8
-
SHA256
e1ae50e8c35c75322916d49196e42d957ef447e0f1f974d0568ce71a59d8bfcc
-
SHA512
eb64dbaf13ebdd144da7a9b7ebd45f09e544ada90e90973392b6ad3191fb894a22be54850b15c3d91338ceb0f7caae5016cdc6b28e190eab07985db8de7ec987
-
SSDEEP
6144:D7uSZ9QwNRcVJ1eGMwNTW7iKOFrbv8/tTg99dw/3QQmsgDlpI532YHXEv:PZ9L4PHginrT0299C/3QQnghEc
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
hotdog25
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2444 TURSH Tool.exe 2292 yTArml.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\AJ2\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" yTArml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\AJ2\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" yTArml.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 yTArml.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 yTArml.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 840 wrote to memory of 2444 840 1c1ff790794298309fc6d52e6cda4131.exe 28 PID 840 wrote to memory of 2444 840 1c1ff790794298309fc6d52e6cda4131.exe 28 PID 840 wrote to memory of 2444 840 1c1ff790794298309fc6d52e6cda4131.exe 28 PID 840 wrote to memory of 2292 840 1c1ff790794298309fc6d52e6cda4131.exe 29 PID 840 wrote to memory of 2292 840 1c1ff790794298309fc6d52e6cda4131.exe 29 PID 840 wrote to memory of 2292 840 1c1ff790794298309fc6d52e6cda4131.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c1ff790794298309fc6d52e6cda4131.exe"C:\Users\Admin\AppData\Local\Temp\1c1ff790794298309fc6d52e6cda4131.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\TURSH Tool.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\TURSH Tool.exe"2⤵
- Executes dropped EXE
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yTArml.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\yTArml.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD56cf9a21b513cdf76d3b333c30ce0e8b7
SHA1f00bcdd860d5c987f28ed15e6faf895c2dc56218
SHA2561d38b499d1c046aed19279f332d96b64ccc47a729c5f6fe425b3d82fee430c26
SHA5126dd0cb993e4866a90d4590e6c51633af0bf53621d85043b8f6df73ebee288c1ae384e93fde0dea8126e2828d2cb41e3948e959240f92f34c2bf5d87e772bf4ec
-
Filesize
56KB
MD50dd0d309642cb8ebf1e9a84b862875ea
SHA1033ab351f19dd6cf3fe51546774adaa8686e858a
SHA25642797508c8546eceb17db4052e6c0a5f993dfa68b80c73dda70b8867325450a6
SHA5121bb0d9cc087168d4c2b39d1ceb8dcf0a19b90189df83122d8a8773246d4a3f2327a5d32f77f140a2e20da6dafa91cd42e9ba0125bc384a744d63d0ff358a4648