Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24fff70f83197065cfd011efcb18c471.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
24fff70f83197065cfd011efcb18c471.exe
-
Size
3.3MB
-
MD5
24fff70f83197065cfd011efcb18c471
-
SHA1
aa7b959d9e71455c062c4d1c1d2069706c878e8a
-
SHA256
8644b5a1ecf282da0e8ad4ff465e7026c26f6d3266f56e71b53e7ea776b03e7f
-
SHA512
e39326653006966e3c5e274aa56d65cc3fc18ee6cd3f7e60083548f16b8ea9cea3809a925484d5615971f9c69f94e99b4c84176683446304c103a5ecc8a95109
-
SSDEEP
98304:7RS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/l:7kj8NBFwxpNOuk2w
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 2716 pJJ3Hwa5a2416H.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 pJJ3Hwa5a2416H.exe 1276 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1724 24fff70f83197065cfd011efcb18c471.exe 1276 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1876 sc.exe 2340 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 24fff70f83197065cfd011efcb18c471.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe 2716 pJJ3Hwa5a2416H.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 24fff70f83197065cfd011efcb18c471.exe Token: SeDebugPrivilege 2716 pJJ3Hwa5a2416H.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2716 1724 24fff70f83197065cfd011efcb18c471.exe 28 PID 1724 wrote to memory of 2716 1724 24fff70f83197065cfd011efcb18c471.exe 28 PID 1724 wrote to memory of 2716 1724 24fff70f83197065cfd011efcb18c471.exe 28 PID 2716 wrote to memory of 1396 2716 pJJ3Hwa5a2416H.exe 32 PID 2716 wrote to memory of 1396 2716 pJJ3Hwa5a2416H.exe 32 PID 2716 wrote to memory of 1396 2716 pJJ3Hwa5a2416H.exe 32 PID 1396 wrote to memory of 2340 1396 cmd.exe 31 PID 1396 wrote to memory of 2340 1396 cmd.exe 31 PID 1396 wrote to memory of 2340 1396 cmd.exe 31 PID 1396 wrote to memory of 1876 1396 cmd.exe 30 PID 1396 wrote to memory of 1876 1396 cmd.exe 30 PID 1396 wrote to memory of 1876 1396 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\24fff70f83197065cfd011efcb18c471.exe"C:\Users\Admin\AppData\Local\Temp\24fff70f83197065cfd011efcb18c471.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\pJJ3Hwa5a2416H.exe"C:\Users\Admin\AppData\Local\Temp\pJJ3Hwa5a2416H.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDI0ZmZmNzBmODMxOTcwNjVjZmQwMTFlZmNiMThjNDcxLmV4ZQ==2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\cmd.exe"cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled3⤵
- Suspicious use of WriteProcessMemory
PID:1396
-
-
-
C:\Windows\system32\sc.exesc config "SysMain" start=disabled1⤵
- Launches sc.exe
PID:1876
-
C:\Windows\system32\sc.exesc stop "SysMain"1⤵
- Launches sc.exe
PID:2340