Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
dc864750ce373f5b116f0b2e57720c48.exe
Resource
win7-20240221-en
General
-
Target
dc864750ce373f5b116f0b2e57720c48.exe
-
Size
287KB
-
MD5
dc864750ce373f5b116f0b2e57720c48
-
SHA1
35572efd585b1de5737c81554bc8342a896aaf0c
-
SHA256
4ed2308b10226f5dece77a9d581d19f52040d7108eb54106bc3beb8b1f23b954
-
SHA512
504b1edddba1cfd97cbe160ad08948b0e781edc0d0b249acca0afcaabefdf2463b9c031a6fc298cb7544490883e5101db8c4296aef452eb92b30a9e90e7c7977
-
SSDEEP
6144:wwYDnroY0Sszp1V8qipl5e7zqz7YFNJfbHz1zgCHyZ388bsXO7Y:8DnroGsNX8qi1e7zqHEPbhzgCHyqiCb
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" dc864750ce373f5b116f0b2e57720c48.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
B00D.tmppid process 2084 B00D.tmp -
Loads dropped DLL 2 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exepid process 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2168-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1568-14-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1568-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-131-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2084-134-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2084-133-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-315-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-335-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-340-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2168-341-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A93.exe = "C:\\Program Files (x86)\\LP\\775D\\A93.exe" dc864750ce373f5b116f0b2e57720c48.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exedescription ioc process File created C:\Program Files (x86)\LP\775D\A93.exe dc864750ce373f5b116f0b2e57720c48.exe File opened for modification C:\Program Files (x86)\LP\775D\B00D.tmp dc864750ce373f5b116f0b2e57720c48.exe File opened for modification C:\Program Files (x86)\LP\775D\A93.exe dc864750ce373f5b116f0b2e57720c48.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exepid process 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe 2168 dc864750ce373f5b116f0b2e57720c48.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1336 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid process Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeSecurityPrivilege 2712 msiexec.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe Token: SeShutdownPrivilege 1336 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid process 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe 1336 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exedescription pid process target process PID 2168 wrote to memory of 1568 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 1568 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 1568 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 1568 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe dc864750ce373f5b116f0b2e57720c48.exe PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe B00D.tmp PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe B00D.tmp PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe B00D.tmp PID 2168 wrote to memory of 2084 2168 dc864750ce373f5b116f0b2e57720c48.exe B00D.tmp -
System policy modification 1 TTPs 2 IoCs
Processes:
dc864750ce373f5b116f0b2e57720c48.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dc864750ce373f5b116f0b2e57720c48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" dc864750ce373f5b116f0b2e57720c48.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exe"C:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exeC:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exe startC:\Users\Admin\AppData\Roaming\D63B5\1DE77.exe%C:\Users\Admin\AppData\Roaming\D63B52⤵
-
C:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exeC:\Users\Admin\AppData\Local\Temp\dc864750ce373f5b116f0b2e57720c48.exe startC:\Program Files (x86)\B5709\lvvm.exe%C:\Program Files (x86)\B57092⤵
-
C:\Program Files (x86)\LP\775D\B00D.tmp"C:\Program Files (x86)\LP\775D\B00D.tmp"2⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\D63B5\5709.63BFilesize
996B
MD583654dabca53723bc11792f4d5811fa4
SHA128f9f59c760041570ca6f95c52c1df8f92b9c125
SHA25697b2ba73b4c4b475797035e0a7d365ee9e82b3840088f88038b2eb43df11b10f
SHA51240463f77d14fecdc14fd9f0cea233275dd88df8b3c2d6ac8b5f4788b94865a4bbdda4b19dbcd5de092df45b16002d19e91ba56abfd5bfc4a5b03915bfe0e9938
-
C:\Users\Admin\AppData\Roaming\D63B5\5709.63BFilesize
600B
MD5be85904764edab26a6021161b081e6f2
SHA101913652a2668771c81886c1365ff92a005cd7c6
SHA2566516617355bdd82faf2e06b2b3576ceddf09ea251bfb4e031e8ec23cbf5c6f25
SHA512c285dc7fff813aa2715b9cd8f054e3caa7be760434a5f31211d43d8e8bff7aacd83c899c04bb5136e2236ddc5be99687b37a88c6b70110adfabe0fefda19eda6
-
C:\Users\Admin\AppData\Roaming\D63B5\5709.63BFilesize
1KB
MD54c67bfb7ae007cac774a8164f16e4839
SHA19cbca3d8331d40b376001745cf7625a20191dfea
SHA2563a989ce516f4f7911bd3b471ce3e50542ccb03d823694809276be9ce5e1d1c4b
SHA5129ba762888669e3afa1c6e435b56d090f977dbf968b8d3aa9a57663feeac6b6da990c3410c75b233aa7a228a26b4e461dd71a309601255c24f3f68f8df7373044
-
\Program Files (x86)\LP\775D\B00D.tmpFilesize
101KB
MD56248ebe8239384b253fa1f9e37180941
SHA17021d2fe53bca6fff06db05fb22b673b7432c72e
SHA256dc9a3655ca8fd9aaa8be1e58d0399e8a8170c0616ecb279bdf18da7869ad343a
SHA5126ff610e050892f6f583233a72f699bb2ec2ebbc575fe240f7f44624e6ea7e588d4980e9a4e47435a0f643e5fbd1d9a20c93af6bc5ab3b12f2b3e16614970cafd
-
memory/1336-338-0x0000000003E50000-0x0000000003E51000-memory.dmpFilesize
4KB
-
memory/1336-314-0x0000000003E50000-0x0000000003E51000-memory.dmpFilesize
4KB
-
memory/1568-15-0x00000000005B0000-0x00000000006B0000-memory.dmpFilesize
1024KB
-
memory/1568-14-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1568-316-0x00000000005B0000-0x00000000006B0000-memory.dmpFilesize
1024KB
-
memory/1568-13-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2084-135-0x0000000000676000-0x00000000006BE000-memory.dmpFilesize
288KB
-
memory/2084-333-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2084-336-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2084-334-0x00000000004E0000-0x00000000005E0000-memory.dmpFilesize
1024KB
-
memory/2084-133-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2084-134-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-1-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-341-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-131-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-315-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-335-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-11-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-2-0x00000000005F0000-0x00000000006F0000-memory.dmpFilesize
1024KB
-
memory/2168-340-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-136-0x00000000005F0000-0x00000000006F0000-memory.dmpFilesize
1024KB