Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe
Resource
win10v2004-20231222-en
General
-
Target
4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe
-
Size
56KB
-
MD5
4ea50b7b6c343e2ab86db1ba4a0e7c5f
-
SHA1
b14d9a024cd74a3ea3efd69f51c808fd3b0c0758
-
SHA256
db9de74074dcdc6f8a171236ef3f80dbdc717cdd7e80d468cdf4f90f5001be38
-
SHA512
3197c9dd234c86e8ccde613107d250227136128f8b1ad755c7d8553c9bdf993a901b9942b048ca502426348c868faaa1a7c46ee092ea3559174be6c90f08bedf
-
SSDEEP
768:7gGjQgmUuAQ7oU7dJ8JhWfEXg2X6iEGphCjBAW3:EGcgmUuvLPEWMXMGPZY
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
riveton98
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{Qb82qS15-lngd-8C11-amUI-D6jMDmaW6Yf4} 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{Qb82qS15-lngd-8C11-amUI-D6jMDmaW6Yf4}\stubpath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows Firewall\\WIN32.exe" 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{Qb82qS15-lngd-8C11-amUI-D6jMDmaW6Yf4}\ComponentID = "User Account Control" 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{Qb82qS15-lngd-8C11-amUI-D6jMDmaW6Yf4}\ = "Microsoft Windows" 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 sveeost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Assum\\AppData\\Roaming\\Microsoft\\Local\\sveeost.exe" 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Assum\\AppData\\Roaming\\Microsoft\\Local\\sveeost.exe" 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Assum\\AppData\\Roaming\\Microsoft\\Local\\sveeost.exe" sveeost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Assum\\AppData\\Roaming\\Microsoft\\Local\\sveeost.exe" sveeost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 sveeost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe 2900 sveeost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2900 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe 28 PID 1724 wrote to memory of 2900 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe 28 PID 1724 wrote to memory of 2900 1724 4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe"C:\Users\Admin\AppData\Local\Temp\4ea50b7b6c343e2ab86db1ba4a0e7c5f.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Assum\AppData\Roaming\Microsoft\Local\sveeost.exe"C:\Users\Assum\AppData\Roaming\Microsoft\Local\sveeost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD54ea50b7b6c343e2ab86db1ba4a0e7c5f
SHA1b14d9a024cd74a3ea3efd69f51c808fd3b0c0758
SHA256db9de74074dcdc6f8a171236ef3f80dbdc717cdd7e80d468cdf4f90f5001be38
SHA5123197c9dd234c86e8ccde613107d250227136128f8b1ad755c7d8553c9bdf993a901b9942b048ca502426348c868faaa1a7c46ee092ea3559174be6c90f08bedf