Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 08:23

General

  • Target

    file_transfer_tools.exe

  • Size

    801KB

  • MD5

    41dcc29d7eaba7b84fd54323394712af

  • SHA1

    ddc0100723cc2dc9ae8b02a0cb7fe4a86c02d54b

  • SHA256

    a909bef708a47ae428fedbc566132c56f15ae7511dc460cf22055ec1a72d485a

  • SHA512

    5a3e8c1eda558e0b90470d752490bc4d04610f93e453cbfd9013a363cfdf5e607974d526c49efe2ef0440e241d775b66bd7c48c74ee9e8677a37cdedc30c42ee

  • SSDEEP

    6144:xmbuKA33X1rgMuu+xdaXkW+zF6m8XZPELSrPzA:x6XA33X1rTuuyrVZ6m8XGH

Malware Config

Signatures

  • Meta Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • MetaStealer payload 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe
    "C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi" /Qn
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56D0850E81A5AA128ED9F3E9C1DFFCFC
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2564
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe" /VERYSILENT /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • Gathers system information
          PID:632
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath "$env:LOCALAPPDATA\Microsoft\windows\systemtask.exe"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi

    Filesize

    3.8MB

    MD5

    7896667f54fe3e6e0d275104d878fec1

    SHA1

    e1ba924eabb739d33036e76bb7355f8e2f5742bd

    SHA256

    6293a90db282d0b5f36a46903cf184ab3bf25e99c2b24042a84b7aebcdf08c3b

    SHA512

    7784e9cc1fa115e2026a67fe5734db22d81f35bfb3cc2f86048cbf45e2cdea9bef70aebe70ffaf8c09b729afdc7b786e2e2647c5b82551b77166af4c334ff7e3

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files.cab

    Filesize

    3.5MB

    MD5

    8d210cf5a4958e5b408d9416f2582661

    SHA1

    6c292799e29293a2233b3bea9e8c22734636426f

    SHA256

    37e0ec91d08372051edd9c3da83a689f6551b6fc2a50bd08429065d3c8ed3e0b

    SHA512

    7b8afcdd99d5e871afa54fb375606ecc9c693d19ace084c2121f3ae50551e102314641edaeb11331caa7a244cf40067249ffa2f71f27e040aa92874ff174b812

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe

    Filesize

    354.2MB

    MD5

    9b25254c4e427d0946e6c3b57758bc9d

    SHA1

    9051ea055e4306e29df34263bee2ed5bfe104073

    SHA256

    2e69b2ba6310cb4ce3ddafc169c5ddcf8ec881186dc565227976bc29863fd0e9

    SHA512

    53ca94eff3e68a629d1125f3a9117ff2a181ce37b91b9a1f6f5cc814676a072e9ad52febff7cbdd3646e310162d65c96d244d1a253a279e0a216fc0f12b3971e

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\msiwrapper.ini

    Filesize

    1KB

    MD5

    8e9a4cc1b3393243e34572401329cfc6

    SHA1

    2b5f1a12c404b7099cd886651cdeb916673857f7

    SHA256

    9280935667e87f8011edebabc20fcf3feaa1adbcbd42df103038d131f90f1bcf

    SHA512

    1dbc39db1731e5c3281ff68b31fea1d57301009c43d9edaaec6630280fdd8f732335b61898fc20c435161770e144e84fa7bb8f7de171389a2ae5113b5e34af39

  • C:\Windows\Installer\MSI169C.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

  • memory/336-88-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-85-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-86-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-87-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-90-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-91-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-92-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-93-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/1552-69-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB

  • memory/1552-72-0x0000000010000000-0x000000001072E000-memory.dmp

    Filesize

    7.2MB

  • memory/1552-84-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB

  • memory/1552-67-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB