Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
6480943af07e313616aabe21c5305eaf.exe
Resource
win7-20231129-en
General
-
Target
6480943af07e313616aabe21c5305eaf.exe
-
Size
3.7MB
-
MD5
6480943af07e313616aabe21c5305eaf
-
SHA1
27455fefee28582558e8fa436a466484d1c7d632
-
SHA256
e4d9d93d7d0bd77e9ab712b36cbe40e0a33ac158d0177527a55006222349c577
-
SHA512
c539d686a7075cbb380334c2f1b72a037302fca9fc871fac1581995eb9631ae214a6ce18052d8d5c5c6ed8f79eb9bb7fe359275e34a9c87e87892706042c5368
-
SSDEEP
98304:F2m4OyJ8X/ND+aTGQQ4BSLWCilhsiL3KG4oi:omHQaT7jS6CibCG4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1936 setup.exe 2740 s_install.exe -
Loads dropped DLL 10 IoCs
pid Process 2248 6480943af07e313616aabe21c5305eaf.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 2740 s_install.exe 2740 s_install.exe 2740 s_install.exe 2740 s_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA s_install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{DFEFCDEE-CF1A-4FC8-89AF-189327213627} setup.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\InProcServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\toolplugin\\toolbar.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\InProcServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\ = "toolplugin" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\Implemented Categories setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DFEFCDEE-CF1A-4FC8-89AF-189327213627}\Implemented Categories\{00021494-0000-0000-C000-000000000046} setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1936 setup.exe 1936 setup.exe 2740 s_install.exe 2740 s_install.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe 1936 setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2248 6480943af07e313616aabe21c5305eaf.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 2248 wrote to memory of 1936 2248 6480943af07e313616aabe21c5305eaf.exe 28 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29 PID 1936 wrote to memory of 2740 1936 setup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6480943af07e313616aabe21c5305eaf.exe"C:\Users\Admin\AppData\Local\Temp\6480943af07e313616aabe21c5305eaf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe.\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\s_install.exe"C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\s_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5eef91274f5a0a5a3dc745ecebb9d66f1
SHA1f94de0c1d1182b03fddc716196f13cbce815ff30
SHA256b8c35bb5d42e1b8ea842e720f01321f290fb1ae7f0519954a4cf6473b796247a
SHA5122fa24ec1169b59bd8ff2f4eabd4525a41e9aa17003a8ee65bca244ddb5df929f14d6b778dc4408585e551d265ac59cb355d908f61a71cf159172febaf83b1ed2
-
Filesize
217KB
MD5a2694a9ee5b78aab724cb19b05bc80c9
SHA1ae3f4aabb9a184f6628c356f77d6321d3598e6a7
SHA2567ed7706289ad98eb02e1b0ee7ee902cc22f9afc651a149486d270798b048946d
SHA5122d3a816466fecb9958b4e9f5de79ceea787a43ce352daa4c6200be73a0507cb9a58f4740ff68a3aa87bdef5bfdbb33cfcc0837b5c57b5ac8d00997e6538d56bf
-
Filesize
288KB
MD51e9381164c15c397f2b282333666d13b
SHA1c56d09bec6e34a5186df45163c428730652b2c0d
SHA2566c4b27e8883850b6374fcb49063c42a3f02ac350f6dc807b9c1ffaca201a10fa
SHA51265e74fe483aecadfc1e9392ca6b0e711774050f91552d9d9223a671b623c482a15cdf75bad5d9a10260b7573ca80869fd66f29bc8de65169e053355d0378643a
-
Filesize
204KB
MD559b566516e3c99bee8252f42821f4b16
SHA19fd8715f0264e88d22dc519082207b0c91227466
SHA2566bc35ad5c9497a45be8abfc159073796fd0c92573b39fa7d62c16b604a34aa6f
SHA51218c77df776c203438bd5836b1dfdc09114f24dbd776251a50a039bbc5273e174f70235a1200632e7a86244c40b0e5bd36c2f8dc1c789d8685d278ce2e8b8817a
-
Filesize
277KB
MD555a57d02fc0d3c626012d0fad914e2ce
SHA1c9cb9803e985c620ff5f98dc3e16e481791aa69e
SHA256b9873919fdc1e847c4c943b41dacb0c7f82744c874794a0de3fe01c13830526b
SHA512f13137246dd29da72378c6f98b8a46d8550733e642269b50b2c499f563aaed4e86346168e6c14fec59f77cfa2adbff177a9db4bab29e77cb0f2860598d753bba
-
Filesize
316KB
MD552cbef2f06d9586363c5f82d00b42626
SHA13fe1066fc8f28a89b34ae69587a569b58e6783b1
SHA2562727634e3aae331d777cebcd9e2195963bacb81aea3434ae79ce5ded2d631c8f
SHA512944481e75d86402027de8d3c428b3b34bc3b41e518e07359504db18f30b334576b93cae2dfe4001d86f4f3b4d28012d14c7b06942275c17d07400b7f82e96187
-
Filesize
237KB
MD574145e1d71e2c5f26c0d2875fd682b8e
SHA1d48079ba76ed87f25d5beb75bc5bf9c5aa3cc0be
SHA256b93adac09cf28ef76a710c430b2dd7a38889e6508bad426455cd356f0af83f47
SHA51238b902abf344ea515f6a9d2ac513b763ffb6170f9d5374c8f4d36e7a71a15bf74a84c6c017cd8c1d79da54ae10fcc9660f5d62b4ea63eeaf8c4fc5e6f1e90595
-
Filesize
311KB
MD5931ab601b314327a6ea6af564f9d6dbd
SHA183eff98db69b28cc4975a76674352903fec91586
SHA256b396a047b07d75223005606067c700d7a4303dfcb4aa3f894c63ac14da42c304
SHA5128025b6cb04f8148e62a42526936932f3a6c2de69132cee49e1d1bbbdb4d311c4f1028063efc25db5aa660bf3d81aeed6378f4d9df0605300a2d579997d93ad20
-
Filesize
355KB
MD5be19379c701cdd2f01117cabb483eae4
SHA1581cd277977dd04573283dab7d60e6266b9a6174
SHA2566c979ef93ba8cf76853312941585cb87f229bac4bdf63813c9adde0c374076f6
SHA512d74eae795da50936dfa600989930fee2794403e9b97d476213853057549488a5e67d328c3d5f43a3c30d5a2d597b87e7c8a734e540e883e4727ee31c1faf0cd1
-
Filesize
304KB
MD5733f3ac046ead15afc5ad411faaaaed0
SHA16d1d4028ecef45bcf10fbd65db663278157344a6
SHA25649c005e7d853892eaea7b1e3aa39de7a6598db1b94510f4c3cdcec172aedc6c2
SHA51281ddf77a1f9c3e774b2a79254250cc2f124696fcb0fdbefad2044643dcd5cea35f7e5e4545cd88cf30de9d6fd9b3394a52d56f6bf91601c51b65a69d2d3356e6
-
Filesize
220KB
MD5993f50fcaa5cac58d4e2d05f6f376df8
SHA15cf3c13cf35322ad29dbf046fda23477c8d5b1ea
SHA2563ad4b443e343ee6f53c6c698bb89fa00109e8b9237bd6e33130f38e8849912e3
SHA512350b27f0a158401529229f3a7e4d2578fcf0a0356a5a9868e1af35e18d557a4545ae4134b9d308793641d70dd264cee794a3b257860990ab2bd442894a8e5a97
-
Filesize
666KB
MD534a53701f595d002fa8b65655f41e6ae
SHA111f29f4c7836011cacbf201b0057c079a831c31e
SHA25668b403e06f0d9dc2e776f82167fd4bf2e392d271533d091cb826f4dcb3b7b1df
SHA512180afc8c738dcb09d233700b2e43be3d8d5a14885e7940966ca85e1203baa76a4d9a383299e6da278f0b02c963c9845ab41ba0277f5da4c46230f6bdd4484339