Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
68a2b5fbaf47a4233e11a9d0451da56e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68a2b5fbaf47a4233e11a9d0451da56e.exe
Resource
win10v2004-20231215-en
General
-
Target
68a2b5fbaf47a4233e11a9d0451da56e.exe
-
Size
279KB
-
MD5
68a2b5fbaf47a4233e11a9d0451da56e
-
SHA1
f954699b281b2637a6eb067a73f7a4910145564e
-
SHA256
e554ff8040da714063734dc2926e89e8efc2675a567026581c137f447260eed0
-
SHA512
cbacd2d13a40efe58872b2e54ce6fcbab13c9b427b64b5f66b3cdad6e83f51c24cf281f66f8f77d6c2309b747eecf6e29b1517c661d4665a2324e7acbfbe0bd6
-
SSDEEP
6144:ZeTFL7AAK0D9ZrKeGaOeDKAZZtWlLFpnKOzWKPAAQ2o5dy5d6x:ZwpK0bfGWJDtWnh9eAQ20X
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1480 D826.tmp -
Loads dropped DLL 2 IoCs
pid Process 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2220-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2964-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2220-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2300-83-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2220-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2220-168-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2220-213-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B2F.exe = "C:\\Program Files (x86)\\LP\\0AA3\\B2F.exe" 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\0AA3\B2F.exe 68a2b5fbaf47a4233e11a9d0451da56e.exe File opened for modification C:\Program Files (x86)\LP\0AA3\D826.tmp 68a2b5fbaf47a4233e11a9d0451da56e.exe File opened for modification C:\Program Files (x86)\LP\0AA3\B2F.exe 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1476 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2808 msiexec.exe Token: SeTakeOwnershipPrivilege 2808 msiexec.exe Token: SeSecurityPrivilege 2808 msiexec.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe Token: SeShutdownPrivilege 1476 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2964 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 30 PID 2220 wrote to memory of 2964 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 30 PID 2220 wrote to memory of 2964 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 30 PID 2220 wrote to memory of 2964 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 30 PID 2220 wrote to memory of 2300 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 32 PID 2220 wrote to memory of 2300 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 32 PID 2220 wrote to memory of 2300 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 32 PID 2220 wrote to memory of 2300 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 32 PID 2220 wrote to memory of 1480 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 34 PID 2220 wrote to memory of 1480 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 34 PID 2220 wrote to memory of 1480 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 34 PID 2220 wrote to memory of 1480 2220 68a2b5fbaf47a4233e11a9d0451da56e.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 68a2b5fbaf47a4233e11a9d0451da56e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 68a2b5fbaf47a4233e11a9d0451da56e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exe"C:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exeC:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exe startC:\Users\Admin\AppData\Roaming\37A09\F970A.exe%C:\Users\Admin\AppData\Roaming\37A092⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exeC:\Users\Admin\AppData\Local\Temp\68a2b5fbaf47a4233e11a9d0451da56e.exe startC:\Program Files (x86)\09C2A\lvvm.exe%C:\Program Files (x86)\09C2A2⤵PID:2300
-
-
C:\Program Files (x86)\LP\0AA3\D826.tmp"C:\Program Files (x86)\LP\0AA3\D826.tmp"2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fd473b3424e7d72a7bbaf17e48028936
SHA1d67663db26d92b1773b30908dd56981c392815bb
SHA2563a07dbf6cbf52d19c075af15d956bf6fe71371539afebc4c15084e5998852e1b
SHA51266d08f8cfd7b5b696f584d3613cefc241da0aa292aca6f7d6eb3fc228cc7fe39711306c64b5f5e67a500e7713860121a4dd9a11a494ea48c38b77c5ea9e7f938
-
Filesize
600B
MD5187a7f71a938c44ef676752790e5ca53
SHA15ea38a02e6e4a700d2ea2d0ee44b3f92f53001d3
SHA256027ce7c73729aa8323c96f54690cad905c50ab796e18c5ccece165f886f19c53
SHA51261727cc1c1333bf4cf9e188afe843e37f3f854341ee7da17c27a2288e6820f8b925324d8324ade1cf532df393c623cad08793a2fd9dca6b1d22f5eb90b27343d
-
Filesize
1KB
MD5d4a0a021d012f2a09e63700c0ef7568d
SHA1b28f3a443cb193f9062c454da38642ab88becc70
SHA2561add7377e1977fb819952e3da1e12c1c4f0d8ddc5436454fc809180fafb7f8dd
SHA512492f3fbc06a3f3d968eaab86dd57dde93587c20c8e03a9bdd5fd7daf6638ad7b0d1e46225419f4ebd758226a184418329e1a00105b5e1c0951731cee76d6911b
-
Filesize
996B
MD51ba8a6da6e0219cc1d659d0c839bfa09
SHA1027e0fb1e7ee8578881b63b535132cba15daa329
SHA256bbb1d5f9be2a636c5101abc8032049e2176d45f07f9c10940abd7a0516e83343
SHA5126e62617ba83c40120240e7d7b0849ea81e2c1bea9e135cfca7e9b322759773de2be43ebc1aa4d2f7841bf7bd99d6d4ba432e5b4cbc739ce168f156005a97a9a4
-
Filesize
97KB
MD5f1dc7cf1cc0a34caaf5a8ccca9d01787
SHA198cd26168c49e0ede4ed8b9ca7cc028e8312ed25
SHA2569fe17ce1615530fe95840eb575a7208f44c3291a5211d86428adb2a289514165
SHA512d8b4e91b06a46aa5f9ae10307e5e3340ae9bacc6453d3dfcbf0f3585cfb7f339ed46a4ed63da03051832d69d1fb34c0aadd6096a095ed436d8fe799896759c00