Overview
overview
10Static
static
3file_trans...ls.exe
windows7-x64
10file_trans...ls.exe
windows10-2004-x64
10job_descri...df.url
windows7-x64
1job_descri...df.url
windows10-2004-x64
1libcrypto-1_1-x64.dll
windows7-x64
10libcrypto-1_1-x64.dll
windows10-2004-x64
10vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
file_transfer_tools.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
file_transfer_tools.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
job_description_hays.pdf.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
job_description_hays.pdf.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
libcrypto-1_1-x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
libcrypto-1_1-x64.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral7
Sample
vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
vcruntime140.dll
Resource
win10v2004-20240226-en
General
-
Target
file_transfer_tools.exe
-
Size
801KB
-
MD5
41dcc29d7eaba7b84fd54323394712af
-
SHA1
ddc0100723cc2dc9ae8b02a0cb7fe4a86c02d54b
-
SHA256
a909bef708a47ae428fedbc566132c56f15ae7511dc460cf22055ec1a72d485a
-
SHA512
5a3e8c1eda558e0b90470d752490bc4d04610f93e453cbfd9013a363cfdf5e607974d526c49efe2ef0440e241d775b66bd7c48c74ee9e8677a37cdedc30c42ee
-
SSDEEP
6144:xmbuKA33X1rgMuu+xdaXkW+zF6m8XZPELSrPzA:x6XA33X1rTuuyrVZ6m8XGH
Malware Config
Signatures
-
Meta Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
MetaStealer payload 1 IoCs
resource yara_rule behavioral1/memory/1552-72-0x0000000010000000-0x000000001072E000-memory.dmp family_metastealer -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2564 ICACLS.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Installer\f761564.msi msiexec.exe File opened for modification C:\Windows\Installer\f761564.msi msiexec.exe File created C:\Windows\Installer\f761567.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI169C.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE -
Executes dropped EXE 1 IoCs
pid Process 1552 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2768 MsiExec.exe 2768 MsiExec.exe 2768 MsiExec.exe 2768 MsiExec.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 632 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2648 msiexec.exe 2648 msiexec.exe 1552 setup.exe 1552 setup.exe 1552 setup.exe 1552 setup.exe 1552 setup.exe 1552 setup.exe 336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeShutdownPrivilege 2916 msiexec.exe Token: SeIncreaseQuotaPrivilege 2916 msiexec.exe Token: SeRestorePrivilege 2648 msiexec.exe Token: SeTakeOwnershipPrivilege 2648 msiexec.exe Token: SeSecurityPrivilege 2648 msiexec.exe Token: SeCreateTokenPrivilege 2916 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2916 msiexec.exe Token: SeLockMemoryPrivilege 2916 msiexec.exe Token: SeIncreaseQuotaPrivilege 2916 msiexec.exe Token: SeMachineAccountPrivilege 2916 msiexec.exe Token: SeTcbPrivilege 2916 msiexec.exe Token: SeSecurityPrivilege 2916 msiexec.exe Token: SeTakeOwnershipPrivilege 2916 msiexec.exe Token: SeLoadDriverPrivilege 2916 msiexec.exe Token: SeSystemProfilePrivilege 2916 msiexec.exe Token: SeSystemtimePrivilege 2916 msiexec.exe Token: SeProfSingleProcessPrivilege 2916 msiexec.exe Token: SeIncBasePriorityPrivilege 2916 msiexec.exe Token: SeCreatePagefilePrivilege 2916 msiexec.exe Token: SeCreatePermanentPrivilege 2916 msiexec.exe Token: SeBackupPrivilege 2916 msiexec.exe Token: SeRestorePrivilege 2916 msiexec.exe Token: SeShutdownPrivilege 2916 msiexec.exe Token: SeDebugPrivilege 2916 msiexec.exe Token: SeAuditPrivilege 2916 msiexec.exe Token: SeSystemEnvironmentPrivilege 2916 msiexec.exe Token: SeChangeNotifyPrivilege 2916 msiexec.exe Token: SeRemoteShutdownPrivilege 2916 msiexec.exe Token: SeUndockPrivilege 2916 msiexec.exe Token: SeSyncAgentPrivilege 2916 msiexec.exe Token: SeEnableDelegationPrivilege 2916 msiexec.exe Token: SeManageVolumePrivilege 2916 msiexec.exe Token: SeImpersonatePrivilege 2916 msiexec.exe Token: SeCreateGlobalPrivilege 2916 msiexec.exe Token: SeRestorePrivilege 2648 msiexec.exe Token: SeTakeOwnershipPrivilege 2648 msiexec.exe Token: SeRestorePrivilege 2648 msiexec.exe Token: SeTakeOwnershipPrivilege 2648 msiexec.exe Token: SeDebugPrivilege 336 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2916 1772 file_transfer_tools.exe 28 PID 1772 wrote to memory of 2916 1772 file_transfer_tools.exe 28 PID 1772 wrote to memory of 2916 1772 file_transfer_tools.exe 28 PID 1772 wrote to memory of 2916 1772 file_transfer_tools.exe 28 PID 1772 wrote to memory of 2916 1772 file_transfer_tools.exe 28 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2648 wrote to memory of 2768 2648 msiexec.exe 30 PID 2768 wrote to memory of 2564 2768 MsiExec.exe 31 PID 2768 wrote to memory of 2564 2768 MsiExec.exe 31 PID 2768 wrote to memory of 2564 2768 MsiExec.exe 31 PID 2768 wrote to memory of 2564 2768 MsiExec.exe 31 PID 2768 wrote to memory of 2116 2768 MsiExec.exe 33 PID 2768 wrote to memory of 2116 2768 MsiExec.exe 33 PID 2768 wrote to memory of 2116 2768 MsiExec.exe 33 PID 2768 wrote to memory of 2116 2768 MsiExec.exe 33 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 2768 wrote to memory of 1552 2768 MsiExec.exe 35 PID 1552 wrote to memory of 632 1552 setup.exe 38 PID 1552 wrote to memory of 632 1552 setup.exe 38 PID 1552 wrote to memory of 632 1552 setup.exe 38 PID 1552 wrote to memory of 632 1552 setup.exe 38 PID 1552 wrote to memory of 336 1552 setup.exe 42 PID 1552 wrote to memory of 336 1552 setup.exe 42 PID 1552 wrote to memory of 336 1552 setup.exe 42 PID 1552 wrote to memory of 336 1552 setup.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe"C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi" /Qn2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56D0850E81A5AA128ED9F3E9C1DFFCFC2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:2564
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe"C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe" /VERYSILENT /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "$env:LOCALAPPDATA\Microsoft\windows\systemtask.exe"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD57896667f54fe3e6e0d275104d878fec1
SHA1e1ba924eabb739d33036e76bb7355f8e2f5742bd
SHA2566293a90db282d0b5f36a46903cf184ab3bf25e99c2b24042a84b7aebcdf08c3b
SHA5127784e9cc1fa115e2026a67fe5734db22d81f35bfb3cc2f86048cbf45e2cdea9bef70aebe70ffaf8c09b729afdc7b786e2e2647c5b82551b77166af4c334ff7e3
-
Filesize
3.5MB
MD58d210cf5a4958e5b408d9416f2582661
SHA16c292799e29293a2233b3bea9e8c22734636426f
SHA25637e0ec91d08372051edd9c3da83a689f6551b6fc2a50bd08429065d3c8ed3e0b
SHA5127b8afcdd99d5e871afa54fb375606ecc9c693d19ace084c2121f3ae50551e102314641edaeb11331caa7a244cf40067249ffa2f71f27e040aa92874ff174b812
-
Filesize
354.2MB
MD59b25254c4e427d0946e6c3b57758bc9d
SHA19051ea055e4306e29df34263bee2ed5bfe104073
SHA2562e69b2ba6310cb4ce3ddafc169c5ddcf8ec881186dc565227976bc29863fd0e9
SHA51253ca94eff3e68a629d1125f3a9117ff2a181ce37b91b9a1f6f5cc814676a072e9ad52febff7cbdd3646e310162d65c96d244d1a253a279e0a216fc0f12b3971e
-
Filesize
1KB
MD58e9a4cc1b3393243e34572401329cfc6
SHA12b5f1a12c404b7099cd886651cdeb916673857f7
SHA2569280935667e87f8011edebabc20fcf3feaa1adbcbd42df103038d131f90f1bcf
SHA5121dbc39db1731e5c3281ff68b31fea1d57301009c43d9edaaec6630280fdd8f732335b61898fc20c435161770e144e84fa7bb8f7de171389a2ae5113b5e34af39
-
Filesize
208KB
MD50c8921bbcc37c6efd34faf44cf3b0cb5
SHA1dcfa71246157edcd09eecaf9d4c5e360b24b3e49
SHA256fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
SHA512ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108