Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
67151d9ea72c4c724999770fe50fd8a2.exe
Resource
win7-20231129-en
General
-
Target
67151d9ea72c4c724999770fe50fd8a2.exe
-
Size
279KB
-
MD5
67151d9ea72c4c724999770fe50fd8a2
-
SHA1
2c8d5fe18b109a01573a832213fc618dd97abd53
-
SHA256
db6c4c31aec91d55efb9174c4acf54bf7229741ead64c8e2e29c94611d91e47c
-
SHA512
b7413eaeff0fddadca1ec285d7fe8c2ee014502dcfb60a58d1928b38988da21de336daefe109031a7f24d7a92448c714ff165e3adf31bc08198d75ac061a738b
-
SSDEEP
6144:yhX0YplXTnIJQ19PRVmP3sVsmYl1Im9v4PY7ecUWJggKy2Komw2Uk6i:Y0YpusPRzsz9qPUPJgX9CUkh
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 67151d9ea72c4c724999770fe50fd8a2.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 352 9176.tmp -
Loads dropped DLL 2 IoCs
pid Process 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1652-1-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1652-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1808-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1808-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1652-135-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/980-137-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1652-321-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1652-326-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3E1.exe = "C:\\Program Files (x86)\\LP\\A779\\3E1.exe" 67151d9ea72c4c724999770fe50fd8a2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\A779\3E1.exe 67151d9ea72c4c724999770fe50fd8a2.exe File opened for modification C:\Program Files (x86)\LP\A779\3E1.exe 67151d9ea72c4c724999770fe50fd8a2.exe File opened for modification C:\Program Files (x86)\LP\A779\9176.tmp 67151d9ea72c4c724999770fe50fd8a2.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe 1652 67151d9ea72c4c724999770fe50fd8a2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2072 msiexec.exe Token: SeTakeOwnershipPrivilege 2072 msiexec.exe Token: SeSecurityPrivilege 2072 msiexec.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1808 1652 67151d9ea72c4c724999770fe50fd8a2.exe 30 PID 1652 wrote to memory of 1808 1652 67151d9ea72c4c724999770fe50fd8a2.exe 30 PID 1652 wrote to memory of 1808 1652 67151d9ea72c4c724999770fe50fd8a2.exe 30 PID 1652 wrote to memory of 1808 1652 67151d9ea72c4c724999770fe50fd8a2.exe 30 PID 1652 wrote to memory of 980 1652 67151d9ea72c4c724999770fe50fd8a2.exe 32 PID 1652 wrote to memory of 980 1652 67151d9ea72c4c724999770fe50fd8a2.exe 32 PID 1652 wrote to memory of 980 1652 67151d9ea72c4c724999770fe50fd8a2.exe 32 PID 1652 wrote to memory of 980 1652 67151d9ea72c4c724999770fe50fd8a2.exe 32 PID 1652 wrote to memory of 352 1652 67151d9ea72c4c724999770fe50fd8a2.exe 35 PID 1652 wrote to memory of 352 1652 67151d9ea72c4c724999770fe50fd8a2.exe 35 PID 1652 wrote to memory of 352 1652 67151d9ea72c4c724999770fe50fd8a2.exe 35 PID 1652 wrote to memory of 352 1652 67151d9ea72c4c724999770fe50fd8a2.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 67151d9ea72c4c724999770fe50fd8a2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 67151d9ea72c4c724999770fe50fd8a2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exe"C:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exeC:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exe startC:\Users\Admin\AppData\Roaming\9AB74\627A7.exe%C:\Users\Admin\AppData\Roaming\9AB742⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exeC:\Users\Admin\AppData\Local\Temp\67151d9ea72c4c724999770fe50fd8a2.exe startC:\Program Files (x86)\74D6E\lvvm.exe%C:\Program Files (x86)\74D6E2⤵PID:980
-
-
C:\Program Files (x86)\LP\A779\9176.tmp"C:\Program Files (x86)\LP\A779\9176.tmp"2⤵
- Executes dropped EXE
PID:352
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD59eabdd0160aa46c3d8551ef703eb9664
SHA1d87cae76621bf28903cf0636f88e8165176383b5
SHA25601ae31b1e56b2de04132cb9d233a246d6c12184d8938f82cadbf9f9e3d3d7c17
SHA5122cc7b0f55b4c31e23adf41bf9b5f0067351a26c097f83a68b0c55f086770528dc89102896f7c83a89f507f882977dd3b9b8b982c165b151246117f1646cbe148
-
Filesize
1KB
MD58b8313afba762daa21b2563104b29cb8
SHA16c9172db5cdb1346b1180e4dee21c6c11804cb6d
SHA256564bdeeffbacc4aba1a770fa9ef97caacf51fbbd06d20ff32dbf6fd57cf46f93
SHA51247435d868f6b4a94d83c232ce5e0c24cfe2109a49c9554d8c1b94d60ac4bedfa506aec395da0c3c21a596d7ce1c8c415ed83ac130343948e8f42355e632b704f
-
Filesize
600B
MD5b3476c5a1321b4044d0cc0adee439e5e
SHA149e6d111c414cfc709dff240e406e521960c95f1
SHA256b7e3056132eb17e96ebdd58a4b5d0f3473cd96fef4ddf43ea3ddddb08cb95db3
SHA512ff76f563047cf83e66be8316c94004facbbb6eae16fa573d0379be5538e3bfd40e9fa0f830a6d435feee54993a6b18c797a8631f35e8a1a368da0ecfa713181a
-
Filesize
100KB
MD5e58302bb7fff8ff38398a39d41d01138
SHA178af95fb145130591e8042b1c2fc55de5d400f29
SHA25604b45c5c0a776c46ee2caff5ea392d4ec4b6df2856d60ff70fa14b160bab8b29
SHA51245b5dd2041ce9ba158445ad7104570e37645b6b93914cba49accc655eff364ec01aff9f24e1059dad4be642ea8f57bc7d64a8cd50f2289d3d85fe81c56f40654