Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
a13649815e9792abf139875f03fe1e7b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a13649815e9792abf139875f03fe1e7b.exe
Resource
win10v2004-20240221-en
General
-
Target
a13649815e9792abf139875f03fe1e7b.exe
-
Size
44KB
-
MD5
a13649815e9792abf139875f03fe1e7b
-
SHA1
c3b40e87893ae6dac045c10ac401528d28b767f7
-
SHA256
2b4df35eda74a9f451226cd2b323808803adcc3788587f9de7307058e5fa3cb7
-
SHA512
e924f60965db437c522079f2b7ab430d447310a134a0b335c9307103516d21b7b42691f4e6ba6ecf9105e552d963d85dbb65ae75706304b2aafb7bb2dbff3e9e
-
SSDEEP
768:nhdPT33ZkuSdzL+XwFlVY/qCYJxhJGroZNeGMwTpnoSQoBGbF5HhD8zT/xQxCIEm:nDPquSdzQwFYSCYJxkoZNOwloSXBGbFJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Users\\Admin\\AppData\\Roaming\\appconf32.exe," TSTheme.exe -
Deletes itself 1 IoCs
pid Process 2820 TSTheme.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 TSTheme.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" TSTheme.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" TSTheme.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main TSTheme.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2848 a13649815e9792abf139875f03fe1e7b.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe 2820 TSTheme.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28 PID 2848 wrote to memory of 2820 2848 a13649815e9792abf139875f03fe1e7b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a13649815e9792abf139875f03fe1e7b.exe"C:\Users\Admin\AppData\Local\Temp\a13649815e9792abf139875f03fe1e7b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\TSTheme.exeC:\Windows\system32\TSTheme.exe2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2820
-