Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe
Resource
win10v2004-20240226-en
General
-
Target
68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe
-
Size
8.1MB
-
MD5
6bad4538fcf95af6639dcaeffc6a2e34
-
SHA1
cbfe159b8f43fdbf4355e063b587f07ef84413bc
-
SHA256
68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6
-
SHA512
bf8d02af66b9b8ca22da1b35a7d6eeb4a93c77eb33ad64f6cd3ba2cf648f46b899f6de7f9f9636f3741956d2ba8cabc958a6c43cec7c6c6c15090beea7cea675
-
SSDEEP
98304:nMnPlREdwDXuh8/67Bo7avdPMtodX2hQp1RiXhnaKlbqLl:KPlRYjGavqot8Rj6
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\OfficeSafe = "C:\\WINDOWS\\system32\\taskmgr.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\DefaultID = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\IDTemplates\\ENU\\DefaultID.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PWRPNT12 = "c:\\Windows\\ShellNew\\PWRPNT12.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ENUtxt = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Resource\\ENUtxt.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Opened = "c:\\Users\\Admin\\Documents\\Opened.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\These = "c:\\Users\\Admin\\Documents\\These.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\DebugRegister = "c:\\Users\\Admin\\Documents\\DebugRegister.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Recently = "c:\\Users\\Admin\\Documents\\Recently.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\RedoJoin = "c:\\Users\\Admin\\Documents\\RedoJoin.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\SignHere = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\plug_ins\\Annotations\\Stamps\\ENU\\SignHere.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\StandardBusiness = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\plug_ins\\Annotations\\Stamps\\ENU\\StandardBusiness.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PROTTPLN = "c:\\Program Files (x86)\\Microsoft Office\\Office14\\1033\\PROTTPLN.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\SOLVSAMP = "c:\\Program Files (x86)\\Microsoft Office\\Office14\\SAMPLES\\SOLVSAMP.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Are = "c:\\Users\\Admin\\Documents\\Are.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\InvokeUnpublish = "c:\\Users\\Admin\\Downloads\\InvokeUnpublish.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\RevokeClose = "c:\\Users\\Admin\\Documents\\RevokeClose.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\EXCEL12 = "c:\\Windows\\ShellNew\\EXCEL12.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\GetAdd = "c:\\Users\\Admin\\Documents\\GetAdd.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeID = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\IDTemplates\\ENU\\AdobeID.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PDFSigQFormalRep = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\PDFSigQFormalRep.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dynamic = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\plug_ins\\Annotations\\Stamps\\ENU\\Dynamic.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Files = "c:\\Users\\Admin\\Documents\\Files.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ConnectDeny = "c:\\Users\\Admin\\Downloads\\ConnectDeny.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Words = "c:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\plug_ins\\Annotations\\Stamps\\Words.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\ResolveReceive = "c:\\Users\\Admin\\Documents\\ResolveReceive.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\UninstallRemove = "c:\\Users\\Admin\\Documents\\UninstallRemove.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\GetJoin = "c:\\Users\\Admin\\Music\\GetJoin.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\CompleteReceive = "c:\\Program Files\\CompleteReceive.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\PROTTPLV = "c:\\Program Files (x86)\\Microsoft Office\\Office14\\1033\\PROTTPLV.exe" 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\taskmgr.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\SOLVSAMP.XLS 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files\CompleteReceive.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.XLS 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.PPT 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files\CompleteReceive.ppt 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.PPT 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.XLS 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\SOLVSAMP.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\PDFSigQFormalRep.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\Words.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\Words.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\PDFSigQFormalRep.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\Windows\ShellNew\EXCEL12.XLSX 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Windows\ShellNew\EXCEL12.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Windows\ShellNew\PWRPNT12.PPTX 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe File opened for modification \??\c:\Windows\ShellNew\PWRPNT12.exe 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe"C:\Users\Admin\AppData\Local\Temp\68857da7e0c5caf5beb8d7efd7f1ae223e8a5ac32cb203c2b35528649ea4f4f6.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.1MB
MD5b0934b8924c7f634c4ac4bde0ce43ab9
SHA1bce2ff5bd97323a1567cba31de93c370cac9a869
SHA256c1c7e16a2a615f461c41722357b4d7ce4bfb3d1fa59478a612cfe4094ed5f728
SHA512c224a51331bb7889c310033fcf1d4e618a4bbba15cf7afe316cd35cc0284cdba8ec9333b9510a439de047c9f8cd45492f070ed898e4e6d16de3ff1333bbb0168