Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
82a288eea617ea4bda22817e3e6509c7.exe
Resource
win7-20231129-en
General
-
Target
82a288eea617ea4bda22817e3e6509c7.exe
-
Size
273KB
-
MD5
82a288eea617ea4bda22817e3e6509c7
-
SHA1
4a238899b0c921540f30f7129312e9f928ab1038
-
SHA256
45fd11c98bde6bc2670c73ab890cc623b6784632c535eb19d0dae3ebc8ce0408
-
SHA512
1c4d3332dd42da74328b087aa40a328887e558360e36bfde7bd458e2ed532936eba33f302caceba0c92634376d820fb43a66c563150f254e52c088e10c65bf5e
-
SSDEEP
6144:3jcANL1wec32khosSqIh6hRAQTmNtfPO5W18t4A6jWB8T3Kc:3jP+ecFhohhhORr+VPm48t5ibt
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 82a288eea617ea4bda22817e3e6509c7.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 8D90.tmp -
Loads dropped DLL 2 IoCs
pid Process 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2088-1-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2088-11-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/932-13-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2088-142-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2036-144-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2088-336-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2088-341-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C21.exe = "C:\\Program Files (x86)\\LP\\07BD\\C21.exe" 82a288eea617ea4bda22817e3e6509c7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\07BD\C21.exe 82a288eea617ea4bda22817e3e6509c7.exe File opened for modification C:\Program Files (x86)\LP\07BD\C21.exe 82a288eea617ea4bda22817e3e6509c7.exe File opened for modification C:\Program Files (x86)\LP\07BD\8D90.tmp 82a288eea617ea4bda22817e3e6509c7.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe 2088 82a288eea617ea4bda22817e3e6509c7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 904 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeSecurityPrivilege 2568 msiexec.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2088 wrote to memory of 932 2088 82a288eea617ea4bda22817e3e6509c7.exe 30 PID 2088 wrote to memory of 932 2088 82a288eea617ea4bda22817e3e6509c7.exe 30 PID 2088 wrote to memory of 932 2088 82a288eea617ea4bda22817e3e6509c7.exe 30 PID 2088 wrote to memory of 932 2088 82a288eea617ea4bda22817e3e6509c7.exe 30 PID 2088 wrote to memory of 2036 2088 82a288eea617ea4bda22817e3e6509c7.exe 32 PID 2088 wrote to memory of 2036 2088 82a288eea617ea4bda22817e3e6509c7.exe 32 PID 2088 wrote to memory of 2036 2088 82a288eea617ea4bda22817e3e6509c7.exe 32 PID 2088 wrote to memory of 2036 2088 82a288eea617ea4bda22817e3e6509c7.exe 32 PID 2088 wrote to memory of 1336 2088 82a288eea617ea4bda22817e3e6509c7.exe 35 PID 2088 wrote to memory of 1336 2088 82a288eea617ea4bda22817e3e6509c7.exe 35 PID 2088 wrote to memory of 1336 2088 82a288eea617ea4bda22817e3e6509c7.exe 35 PID 2088 wrote to memory of 1336 2088 82a288eea617ea4bda22817e3e6509c7.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 82a288eea617ea4bda22817e3e6509c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 82a288eea617ea4bda22817e3e6509c7.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exe"C:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exeC:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exe startC:\Users\Admin\AppData\Roaming\D614A\FEB07.exe%C:\Users\Admin\AppData\Roaming\D614A2⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exeC:\Users\Admin\AppData\Local\Temp\82a288eea617ea4bda22817e3e6509c7.exe startC:\Program Files (x86)\4A9C1\lvvm.exe%C:\Program Files (x86)\4A9C12⤵PID:2036
-
-
C:\Program Files (x86)\LP\07BD\8D90.tmp"C:\Program Files (x86)\LP\07BD\8D90.tmp"2⤵
- Executes dropped EXE
PID:1336
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD53f4db16f7bbbc701dfdb12d8d77c47c0
SHA1ee9cfc8a7bdc67f394171d13b1efb2bffca9c15a
SHA2561bd88056729b61dc16bc7d97334b71a729f2da9ae931a5bb501f87b6462ffef9
SHA5120e71393e6eac3637449629841ff75f9446cdcdef3e1caeed6e6043c289eaefe62b93948d6b2e21a65d2c021c06c09abe26e04ec502533e8b8876cb16476e3427
-
Filesize
1KB
MD5afe0aa72c4afe0dece66048333586f7c
SHA1dd0491778d4f615bc93fc90ddb6abbdcc51af0be
SHA2562593f23de25ea331459d65b3a629d1ed1735c216ca0c88dba9fa1c3cad7e76b6
SHA5120e0c065e5a2792ff03bc69dd658e1208651eed4d371b63ddb57f945a9333a8aa6edae8ab01ab61e6dc82735cf5494383dbbf57f4737f123d57764b3a298e039f
-
Filesize
600B
MD5cf811889e6025da955101d8434a92105
SHA1c633809a6195971f133f1f9674371f68c0d4e6c3
SHA25618837a7174fe089e1f7c778007a9c38ea749b5ea1b5678622f53719bdc4be2ff
SHA5126fdb5132d8dca74919ddc1480c06c480d1159bf5bcb7dcc9edba26bf536ec9ff9d55434fd93d3d92723a66a640592b2985059aab3116abb54330b2aa71e738eb
-
Filesize
105KB
MD51c2bce0519de8357c7cb082d1be5ef2d
SHA1d6619d654247eab6ea0e15b935e51d6048ab61fd
SHA25689b05808a3d33c0cc66d7ea408fd51021e014361ec0743d12d2b9c158265ec9c
SHA512c7673ebba591e5e6ca9c7d93dd51ec1c92ed2ad215cf20ed4b62abff9ee54117326118ff8c0c78e6028ea4b70b62a7c1648112ebbed5c6428558d366819c876e