Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:32
Behavioral task
behavioral1
Sample
751aa92eb84f2498cff9054af3cd3646.exe
Resource
win7-20231215-en
General
-
Target
751aa92eb84f2498cff9054af3cd3646.exe
-
Size
936KB
-
MD5
751aa92eb84f2498cff9054af3cd3646
-
SHA1
bf75b832f192821ce890ee87ccc4d71d48d7eec2
-
SHA256
1e0e3286fc42990da65ebb86e421a41f020f750a657d1257e221f7d2e19d5430
-
SHA512
cbe4c36e4420086cda17f17a78258cceb0a508ad422d3f345d0580c8993394fa3856b32f12e534db4f101f967d1a781d8f59720c387e0995699cb45a81beec88
-
SSDEEP
24576:59GgrW1jF6aD6buUlyxMd+BmK5CXJ9D2ND:7GJtSByySmeCZc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 751aa92eb84f2498cff9054af3cd3646.exe -
Executes dropped EXE 2 IoCs
pid Process 3452 Run32.exe 4324 Run32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4816-0-0x0000000000400000-0x0000000000D7F000-memory.dmp upx behavioral2/files/0x000300000002272c-11.dat upx behavioral2/files/0x000300000002272c-16.dat upx behavioral2/files/0x000300000002272c-17.dat upx behavioral2/memory/4816-19-0x0000000000400000-0x0000000000D7F000-memory.dmp upx behavioral2/memory/3452-18-0x0000000000400000-0x0000000000D7F000-memory.dmp upx behavioral2/files/0x000300000002272c-23.dat upx behavioral2/memory/3452-25-0x0000000000400000-0x0000000000D7F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Run32.dll = "C:\\Users\\Admin\\AppData\\Roaming\\Run32.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3452 set thread context of 4324 3452 Run32.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4816 751aa92eb84f2498cff9054af3cd3646.exe 3452 Run32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3512 4816 751aa92eb84f2498cff9054af3cd3646.exe 88 PID 4816 wrote to memory of 3512 4816 751aa92eb84f2498cff9054af3cd3646.exe 88 PID 4816 wrote to memory of 3512 4816 751aa92eb84f2498cff9054af3cd3646.exe 88 PID 3512 wrote to memory of 5108 3512 cmd.exe 91 PID 3512 wrote to memory of 5108 3512 cmd.exe 91 PID 3512 wrote to memory of 5108 3512 cmd.exe 91 PID 4816 wrote to memory of 3452 4816 751aa92eb84f2498cff9054af3cd3646.exe 92 PID 4816 wrote to memory of 3452 4816 751aa92eb84f2498cff9054af3cd3646.exe 92 PID 4816 wrote to memory of 3452 4816 751aa92eb84f2498cff9054af3cd3646.exe 92 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93 PID 3452 wrote to memory of 4324 3452 Run32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\751aa92eb84f2498cff9054af3cd3646.exe"C:\Users\Admin\AppData\Local\Temp\751aa92eb84f2498cff9054af3cd3646.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xKqhZ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f3⤵
- Adds Run key to start application
PID:5108
-
-
-
C:\Users\Admin\AppData\Roaming\Run32.exe"C:\Users\Admin\AppData\Roaming\Run32.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Roaming\Run32.exeC:\Users\Admin\AppData\Roaming\Run32.exe3⤵
- Executes dropped EXE
PID:4324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD552dd81881fa3a9e2f376bb73bde15b00
SHA19440375fb9fb0368f982754f76e2efd295b25463
SHA256a937077f0e234149b1e15e413d33c9f55ad3f427be87d806719c96b3b95209a2
SHA51280c8f687f6c58bd0549c29e7df64fa5585fa877ac5505a72772ba0cae44b01397bd4e2c217681f8662ea5aff69f115c3fbc306c6b1c3e33d9089aa4f887d2fb0
-
Filesize
320KB
MD5d3805ac7fe57373282563f1a39df5f03
SHA1c8942e191d3c5f8288e38bb45cb18d62ad4ad5e6
SHA2565cb786b09f1a65603923b4006683ca38f81ed8e259b077ac378465b87647e108
SHA5126c95e7e319fcf8d5948b75e8c3d1282a4ff4405f6fe6ad8de112b220ec3a8faf774bada4aa0193b6af25f153247a0e60b2ed97d144a365931dbd46102313a257
-
Filesize
128KB
MD544d841875b683c5baa2e2ad730730514
SHA1a6291b5b8cb9623fc32d60ede209c3f3a81f7842
SHA2569c9177ed4016bea9b1cf02648831127ef39bb6e3597526de425b6da916f1490e
SHA5121ebae8e3234fe1f9d1f6b673d4c751904a8656494b0772941639d029ea2d7698bfbde6dfe8c6f233d58376b5196817dc00c1ce39cf2f310b682a68032ab30b59
-
Filesize
247KB
MD563009d63b9316e27f51bc930b372e748
SHA133d2774b8efa89978c79461a35f82e792f26a88f
SHA2562e5f4482936f99be5028cd3a102268cd6c46dc06a820d9d1cff5c93c63042d02
SHA512d8492f71c8456527f7d168ef058ed80d3434c9c570cc5c11fa07afd7b8fa629772a03cdacf27c16e7b14fed3c04d75f2a505829bda78d6e3c8f632e97e215f77
-
Filesize
654KB
MD52c1f5b87d4d8a39d5662238ddba3a0d3
SHA1cb2c28648d033048741e3ca0a8e4ecbb08662150
SHA256b66ca32da39fddc5e8826da8e56024ef6ce6cfc5f32a988131c3af1041ba46e4
SHA51238c80b162a0d26a6deca9f03d3ecdf7b1b9832492ca469934f94379c1f2185243a079bfcdd9441e6c308742a7dea7b18c5bda0ef289a00b0a3ddb198958495e4