Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe
Resource
win7-20240220-en
General
-
Target
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe
-
Size
493KB
-
MD5
b5cb180e0403583889e7aae8297db9e4
-
SHA1
a5bd6722dad912944c7e924c8efc0b047cba1ab6
-
SHA256
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1
-
SHA512
5560d1acabd5d48ef8d123987537dc5321327f6ec96aac25417fb059c200846f46f9f074b13ae16cc6da3b14f072cf2ba31f4c7c4b1d434977e30ba88b129581
-
SSDEEP
12288:S+qYt531sYtGVWpPz4IDlwLV1nWGYAZeAEdmSL6nju:Sdw5GVW54IBEV1jAmy6ju
Malware Config
Signatures
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-0-0x0000000063080000-0x00000000631EC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral1/memory/1640-51-0x0000000063080000-0x00000000631EC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables containing base64 encoded User Agent 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-0-0x0000000063080000-0x00000000631EC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent behavioral1/memory/1640-51-0x0000000063080000-0x00000000631EC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent -
Drops startup file 1 IoCs
Processes:
SearchHelper.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ShareIt Service.exe SearchHelper.exe -
Executes dropped EXE 4 IoCs
Processes:
SearchHelper.execom3.execom3.exeSearchHelper.exepid process 2604 SearchHelper.exe 2672 com3.exe 1536 com3.exe 1656 SearchHelper.exe -
Loads dropped DLL 7 IoCs
Processes:
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exepid process 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
com3.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Search Helper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Search\\SearchHelper.exe" com3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Intel GPU = "F:\\Program Files\\Intel GPU\\GfxUI.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exeSearchHelper.execom3.exe3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.execom3.exeSearchHelper.exepid process 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 2604 SearchHelper.exe 2672 com3.exe 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 1536 com3.exe 1656 SearchHelper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SearchHelper.exedescription pid process Token: SeDebugPrivilege 2604 SearchHelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SearchHelper.exepid process 2604 SearchHelper.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.execom3.exedescription pid process target process PID 1640 wrote to memory of 2604 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 1640 wrote to memory of 2604 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 1640 wrote to memory of 2604 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 1640 wrote to memory of 2604 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 1640 wrote to memory of 2672 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 1640 wrote to memory of 2672 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 1640 wrote to memory of 2672 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 1640 wrote to memory of 2672 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 1640 wrote to memory of 2580 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe PID 1640 wrote to memory of 2580 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe PID 1640 wrote to memory of 2580 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe PID 1640 wrote to memory of 2580 1640 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe PID 2580 wrote to memory of 1656 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 2580 wrote to memory of 1656 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 2580 wrote to memory of 1656 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 2580 wrote to memory of 1656 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe SearchHelper.exe PID 2580 wrote to memory of 1536 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 2580 wrote to memory of 1536 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 2580 wrote to memory of 1536 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 2580 wrote to memory of 1536 2580 3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe com3.exe PID 2672 wrote to memory of 2384 2672 com3.exe reg.exe PID 2672 wrote to memory of 2384 2672 com3.exe reg.exe PID 2672 wrote to memory of 2384 2672 com3.exe reg.exe PID 2672 wrote to memory of 2384 2672 com3.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe"C:\Users\Admin\AppData\Local\Temp\3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v "Intel GPU" /d "F:\Program Files\Intel GPU\GfxUI.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe"C:\Users\Admin\AppData\Local\Temp\3dfa782678cbffcc92fc97b6c4ace9ff1898b76bdb2fcd6d382d2bd20ce588b1.exe" silent pause2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\persist.datFilesize
10B
MD5f201ec9db9b3222af6e45db08f89129b
SHA19863317d3283041486a2c88884d0bce7e0afc264
SHA256603a14bbd6fd5d296f63f41f823752af469fb3a1afa2b4e88bb3207be13d8986
SHA5129c3b47766234d925b412911eb70bd08bd3fbdc98c85e9dcfa4fc21eb8058b533c797ce508e1b694dcb7fc0c658b24162baba0d8e956350bd95e12b89c4b32ffe
-
\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exeFilesize
495KB
MD5a4cc07e1c8d1538f895ba56df9452fdf
SHA128e928bad43387da990b55845a76778d6c1d6aed
SHA2566f1294f5b29ee02f7b309b0db54a0d1117d0e0f151d94c8d164ccf0ee0ff863d
SHA5120bd0b57a49aa2a131f7c70139cf9897a8b15b5dcf21caf7f3538d8787ea48011ea6ab9fa858fe9f188ad30e19224f7190141c5c8b45493da5e2c61903ee59552
-
\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exeFilesize
495KB
MD58fef127e00bc89d74f0a9974de2239df
SHA1d736b602d30cb0d9998a3fa21ce65a6d809c21db
SHA2560f30cc037c1aeb841a12148d2af5d9ff59696c1dd602b00dd08b8d0d6c1545b0
SHA512801540b2dc44d511756fe7d1b68d2aba0e96a782ac8959dd154063601fa22ff6f255196047f99bdb1a6ad545e7292be17231d915dee67831694962dca35e5a8e
-
memory/1536-78-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1640-0-0x0000000063080000-0x00000000631EC000-memory.dmpFilesize
1.4MB
-
memory/1640-51-0x0000000063080000-0x00000000631EC000-memory.dmpFilesize
1.4MB
-
memory/1640-52-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1656-89-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB