Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
a1a8b9c13360898aebd46c12abee7018.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1a8b9c13360898aebd46c12abee7018.exe
Resource
win10v2004-20240221-en
General
-
Target
a1a8b9c13360898aebd46c12abee7018.exe
-
Size
274KB
-
MD5
a1a8b9c13360898aebd46c12abee7018
-
SHA1
03bdba42f863a52b325eed51b8b39d4f91b27077
-
SHA256
f11939bf24b075fec37a952e68bc0a9b94eca67dd105d4a9d58e8925a744b263
-
SHA512
b65cec6b7f4313ea4f2ceb297c496bfe8b3da46d0f683e073f353bd02d02d25779dee5fcc95b3b7e4e61ec4cef6f1980a4b59533530f78316d209bc1e73fd2e7
-
SSDEEP
6144:KzPvmPqyDRfTCMVsVXlmd/S9nUg6f2SBn8kUBMyTcRTZQ:ImPFO/Xsw9Ug6f2OFUqyToN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\76B3E\\33ED3.exe" a1a8b9c13360898aebd46c12abee7018.exe -
Executes dropped EXE 1 IoCs
pid Process 680 A035.tmp -
Loads dropped DLL 2 IoCs
pid Process 2816 a1a8b9c13360898aebd46c12abee7018.exe 2816 a1a8b9c13360898aebd46c12abee7018.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2816-1-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/840-13-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/840-12-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2816-15-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1496-69-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2816-71-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2816-150-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1496-153-0x00000000005A0000-0x00000000006A0000-memory.dmp upx behavioral1/memory/2816-188-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2816-189-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\D3A7\A035.tmp a1a8b9c13360898aebd46c12abee7018.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 840 2816 a1a8b9c13360898aebd46c12abee7018.exe 28 PID 2816 wrote to memory of 840 2816 a1a8b9c13360898aebd46c12abee7018.exe 28 PID 2816 wrote to memory of 840 2816 a1a8b9c13360898aebd46c12abee7018.exe 28 PID 2816 wrote to memory of 840 2816 a1a8b9c13360898aebd46c12abee7018.exe 28 PID 2816 wrote to memory of 1496 2816 a1a8b9c13360898aebd46c12abee7018.exe 30 PID 2816 wrote to memory of 1496 2816 a1a8b9c13360898aebd46c12abee7018.exe 30 PID 2816 wrote to memory of 1496 2816 a1a8b9c13360898aebd46c12abee7018.exe 30 PID 2816 wrote to memory of 1496 2816 a1a8b9c13360898aebd46c12abee7018.exe 30 PID 2816 wrote to memory of 680 2816 a1a8b9c13360898aebd46c12abee7018.exe 31 PID 2816 wrote to memory of 680 2816 a1a8b9c13360898aebd46c12abee7018.exe 31 PID 2816 wrote to memory of 680 2816 a1a8b9c13360898aebd46c12abee7018.exe 31 PID 2816 wrote to memory of 680 2816 a1a8b9c13360898aebd46c12abee7018.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe"C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exeC:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe startC:\Program Files (x86)\Internet Explorer\D3A7\4DF.exe%C:\Program Files (x86)\Internet Explorer\D3A72⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exeC:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe startC:\Program Files (x86)\3E8E1\lvvm.exe%C:\Program Files (x86)\3E8E12⤵PID:1496
-
-
C:\Program Files (x86)\Internet Explorer\D3A7\A035.tmp"C:\Program Files (x86)\Internet Explorer\D3A7\A035.tmp"2⤵
- Executes dropped EXE
PID:680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7c8d310c852b5f575a7d21d2f8db28d
SHA165cbcdef5805f93c108a8a45350609d27720d79c
SHA25630bfecc0c0fd5925608839279bf2cefa72ea41e18660ee22a52c156ddfccf533
SHA512f04f1aae136ce176292cf1b03fa04239e51f219741785f5c4881cd05e52b39223285abeffac9bdcac1deb6d8e4332d49be7acb4aec781a1f808f0d8a5e754f44
-
Filesize
600B
MD5c3e0a327cefce0cb2d7a7d9ecc948798
SHA10066ac3de2728c7b5f1448091c72d9cce0615eb2
SHA256a10ea921d822ceab3b1af055b15d39f847274e76a77fb763d6cc5d47e68b8cba
SHA5123572371de3a684c4f6bdf58f073bc767c33417b045093754b1b505ffe73e785657c331e8d4745091a2190e633fc2438984b96be579bed50d7e2c33b9abdbf290
-
Filesize
996B
MD58ac24754bdea3ec3853478d11625ab99
SHA10d9d2e21a54162a2a1cc580bfcdb96ed7b8a874f
SHA2566328e5eeaa8de211fe01703a6d9e8c49f97f5aa3a79bab900c6209033a930542
SHA512a0a195abdf95b5b9f6779cbb3318f0a189a7f68c9103091eadc64ad5842838f679f5bc8409df98c96ad283d3a2ff6a2c4567a5589f6cd8332c195d99c71ceb50
-
Filesize
102KB
MD598983d9e6d149afd05c73f9fc444f4a9
SHA1249cb0c59c29e0ae8940ce6928cb7e6a1d0e5bb9
SHA25684a1c17937e04bd5090897594950e1aef33acfbbbd675fc7e319d000dfb3110a
SHA512d94ac1f1b118ae5779458392b31375b064894807e0fc6a3fb9cbc67fb8897ba591054235bf6b52dfd21dd964bb3fe6449bfc6049ccb5466046bfe95361d33fbb