Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
030bad2f855ca0f00316ddd0bd266bbb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
030bad2f855ca0f00316ddd0bd266bbb.exe
Resource
win10v2004-20231215-en
General
-
Target
030bad2f855ca0f00316ddd0bd266bbb.exe
-
Size
96KB
-
MD5
030bad2f855ca0f00316ddd0bd266bbb
-
SHA1
0576bf7d72f1e1e2e8e1ab60c3aa6e62d8b6f6e8
-
SHA256
b804b753be765e9449600bb7dd46f36cbaa2bc92e29fe62f4e4bde26a1a87ae3
-
SHA512
3343118d0daec3defcd823748fe3872666d3b14ddb99770f35bceaa6de18fdb94bcac267ad82beef7b9459181539390d4cdf1b97a8bb1601dc79eba09d2d1eba
-
SSDEEP
1536:ezDBda3hhnnFhrXzRGxfaBv7kqxgEEVa0:G9da3hhnFhrDu8vZue0
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
darkwarrior
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" REG.exe -
Deletes itself 1 IoCs
pid Process 2180 Svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 Svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 2856 030bad2f855ca0f00316ddd0bd266bbb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Svchost.exe" Svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 2568 REG.exe 2096 REG.exe 2448 REG.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Svchost.exe:ZONE.identifier cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 Svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1804 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 22 PID 2856 wrote to memory of 1804 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 22 PID 2856 wrote to memory of 1804 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 22 PID 2856 wrote to memory of 1804 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 22 PID 2856 wrote to memory of 2180 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 23 PID 2856 wrote to memory of 2180 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 23 PID 2856 wrote to memory of 2180 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 23 PID 2856 wrote to memory of 2180 2856 030bad2f855ca0f00316ddd0bd266bbb.exe 23 PID 2180 wrote to memory of 2568 2180 Svchost.exe 31 PID 2180 wrote to memory of 2568 2180 Svchost.exe 31 PID 2180 wrote to memory of 2568 2180 Svchost.exe 31 PID 2180 wrote to memory of 2568 2180 Svchost.exe 31 PID 2180 wrote to memory of 2448 2180 Svchost.exe 37 PID 2180 wrote to memory of 2448 2180 Svchost.exe 37 PID 2180 wrote to memory of 2448 2180 Svchost.exe 37 PID 2180 wrote to memory of 2448 2180 Svchost.exe 37 PID 2180 wrote to memory of 2096 2180 Svchost.exe 35 PID 2180 wrote to memory of 2096 2180 Svchost.exe 35 PID 2180 wrote to memory of 2096 2180 Svchost.exe 35 PID 2180 wrote to memory of 2096 2180 Svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\030bad2f855ca0f00316ddd0bd266bbb.exe"C:\Users\Admin\AppData\Local\Temp\030bad2f855ca0f00316ddd0bd266bbb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- NTFS ADS
PID:1804
-
-
C:\Users\Admin\AppData\Roaming\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2568
-
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2096
-
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5bafd7322c6e97d25b6299b5d6fe8920b
SHA1816c52fd2bdd94a63cd0944823a6c0aa9384c103
SHA2561ea442a134b2a184bd5d40104401f2a37fbc09ccf3f4bc9da161c6099be3691d
SHA512a145800e53a326d880f4b513436e54a0ab41efc8fdd4f038c0edae948e5ae08d2a7077d5bb648415078dda2571fe92c4d6fa2130a80f53d9dd329e7040729e81
-
Filesize
35KB
MD5a1095b63e5c339d37410809b271412e1
SHA1b79e38991cb87a648a853496c50ce9fc4625a5ab
SHA256fd1098004293ba6bba97ee732bfb0e98fff4065c7940a8bf1b7f4c90ed12ac99
SHA51243fdd3aac678e404bd1155c3939d9ab176ccb6ca3c3edbc195d4b772b164dd5c31edd3090f9b0b2a3604798d4cd5cb4d6f6db6f529e9886ae14d184f162845c3
-
Filesize
7KB
MD58f02dc184e24f0c506606d86e9510aec
SHA16eebafa5fdad92780442ddedd9a969eb4a170783
SHA25640dc0c352a5a207a386490fe2feadbe2e77c3955d5cfd2f75e501a1006f4b89e
SHA5121223e156f354a6289a0c1f9c3d156f8cd3f158f5680228eae3149c8d8221f814f81c952515f520300b06dc8b6c22960fb66fbe146c2f6da95313667e4ff67aff
-
Filesize
27B
MD5130a75a932a2fe57bfea6a65b88da8f6
SHA1b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c
SHA256f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e
SHA5126cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed
-
Filesize
8KB
MD57a214e3fd688843a4b635365d3b7da93
SHA1137f36ae4e70564a89f17f1c087b8f0baa2f1444
SHA256a14289ac6991d9c86283311c301caf25ff6729b7e69368f5d50b9fe287aa22e1
SHA512487f6a9b11ee9059b9eb12b0721f338c876b57bfa8d01af0c3cedbed1bbc0e77c695a15e5722a2dbf59ba68dc4707ee803312f0c2d8f7acdb4583cae02e42aa4
-
Filesize
21KB
MD5fbe70a8789b886c6863584fb87c95617
SHA16acfc6215745c17dd6ca4ca9bc8ff1d83186d646
SHA2564e32a2bfb493af1aca12fca0e9826122d5391148bf0e84d57e9131d7ee5c2c5b
SHA51264daad1e60d50ecde8d8166b27b83cea0b43db55aa2479380193721cc453ee53654992b8fb66ee062962147b8eb3b11b7b789755dcfc901be3009111f1955b9d