Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
Autoplay.exe
Resource
win7-20240221-en
General
-
Target
Autoplay.exe
-
Size
257KB
-
MD5
edafbc9d7eef59cc07d0801e0be9f027
-
SHA1
de3b479d16fbacba44239b0e2eda45367b9ebab1
-
SHA256
6a2048d0dc927b97e9f0dc7b5610d10030958711933d7e980c1151ca841bfd7f
-
SHA512
130b5c9e272ab4674649cdaac7ab1e2d68ce1c391786d95238988304feec9e0f9f659cdae4ec5ff81eb38924238324b67c566deff2c7ceed0e819f13820d0287
-
SSDEEP
6144:fxKQdkTUGJXOjv5o1SDQPd04mhanTqvaGvzUlH07r:5KSkTUGRODePG4mhaXGvMH07r
Malware Config
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Signatures
-
Detect Xehook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2880-0-0x00000000002F0000-0x0000000000334000-memory.dmp family_xehook behavioral2/memory/4528-1-0x0000000000400000-0x000000000041C000-memory.dmp family_xehook behavioral2/memory/2880-2-0x00000000002F0000-0x0000000000334000-memory.dmp family_xehook -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Autoplay.exedescription pid process target process PID 2880 set thread context of 4528 2880 Autoplay.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3080 4528 WerFault.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 4528 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Autoplay.exedescription pid process target process PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe PID 2880 wrote to memory of 4528 2880 Autoplay.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Autoplay.exe"C:\Users\Admin\AppData\Local\Temp\Autoplay.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 17243⤵
- Program crash
PID:3080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4528 -ip 45281⤵PID:2028