Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe
Resource
win7-20231215-en
General
-
Target
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe
-
Size
175KB
-
MD5
2ff6ee1ef4ea7c63588e3c904e066cf4
-
SHA1
85a5d659cdcdd358af7320a39dd129601b9e8c41
-
SHA256
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30
-
SHA512
5d00ea2bbe6384e6f4375210f485b80e8109e4c578775d146423696ce8e6b4beac93d240df329ad443f0b03d13ec46cfdd06e80d52946f662263169fffdb6713
-
SSDEEP
3072:NwLDaY5OIQfqCanVKeZccMBt1n/W77i5ftMwQx6TN45:uLDf5Yo3ZccMB3nAwQ7
Malware Config
Extracted
stealc
http://185.172.128.24
-
url_path
/40d570f44e84a454.php
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2452 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3048 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe 29 PID 2212 wrote to memory of 3048 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe 29 PID 2212 wrote to memory of 3048 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe 29 PID 2212 wrote to memory of 3048 2212 3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe 29 PID 3048 wrote to memory of 2452 3048 cmd.exe 30 PID 3048 wrote to memory of 2452 3048 cmd.exe 30 PID 3048 wrote to memory of 2452 3048 cmd.exe 30 PID 3048 wrote to memory of 2452 3048 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe"C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5ca7d772dbf6d7a0edff015ce4d324278
SHA180ab071da89e7cf93c969575400a96a70525f5ce
SHA25657f899ab12e2a9ffa93bb83a0ebc8f507498948cd42d7354d7b5d1efbe93c6f2
SHA5120d2f0cffac24d3d3c15cbb6038d2f1d350a55f10e52693c5c75d3fc3d420cf32f88cb68aced799d88281a8564bbf97308c51d0baeac44b84fa897c1b5a5e673a
-
Filesize
411KB
MD5144294c493f25912b50f94091f396cce
SHA1e467dfe03750e08fbbb4884d96459433e0530d68
SHA25618f887d5fa55d539a240d49330fddf9555bfd788fabe0028e1cc20aacd058caf
SHA512c421c7818b53754c626d092d112bdf4f9331efcae905e3dc4fdb328600a4db107e1513cdabbfee28132537ab1330fc4bc726c1a3d739958915de62a728f0135a