Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe
Resource
win10v2004-20240426-en
General
-
Target
67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe
-
Size
390KB
-
MD5
eca43de54e4add478849ed721a6c70d2
-
SHA1
7fab60955a0c84e5f954a8e27a5f7b69fd35f79a
-
SHA256
67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e
-
SHA512
94f1d28f2057339987c2f7394939053b01a61767295510941128b8b023f2bd113c40d217ffbd046e2cb7eb6cb882c9d353bab0a91c8ed67e61336c1e0034c8c2
-
SSDEEP
6144:tnFDylqEt71yBuj59x+btkI4pcPNFfz65Xmo+agu+Q9QD6q:dg8EtQ8Wt/Pbehmq9tq
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2984-304-0x0000022915C80000-0x0000022919578000-memory.dmp family_zgrat_v1 behavioral1/memory/2984-307-0x0000022935620000-0x0000022935730000-memory.dmp family_zgrat_v1 behavioral1/memory/2984-311-0x000002291B330000-0x000002291B354000-memory.dmp family_zgrat_v1 -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2720-188-0x0000000000F20000-0x0000000000FE6000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation u1fw.3.exe -
Executes dropped EXE 3 IoCs
pid Process 336 u1fw.0.exe 844 run.exe 2408 u1fw.3.exe -
Loads dropped DLL 5 IoCs
pid Process 844 run.exe 844 run.exe 844 run.exe 336 u1fw.0.exe 336 u1fw.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 844 set thread context of 8 844 run.exe 91 PID 8 set thread context of 2720 8 cmd.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5004 1868 WerFault.exe 81 3084 336 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1fw.3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1fw.3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1fw.3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1fw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1fw.0.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 844 run.exe 844 run.exe 336 u1fw.0.exe 336 u1fw.0.exe 8 cmd.exe 8 cmd.exe 336 u1fw.0.exe 336 u1fw.0.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 844 run.exe 8 cmd.exe 8 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 MSBuild.exe Token: SeDebugPrivilege 2984 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe 2408 u1fw.3.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1868 wrote to memory of 336 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 87 PID 1868 wrote to memory of 336 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 87 PID 1868 wrote to memory of 336 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 87 PID 1868 wrote to memory of 844 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 89 PID 1868 wrote to memory of 844 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 89 PID 1868 wrote to memory of 844 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 89 PID 844 wrote to memory of 8 844 run.exe 91 PID 844 wrote to memory of 8 844 run.exe 91 PID 844 wrote to memory of 8 844 run.exe 91 PID 844 wrote to memory of 8 844 run.exe 91 PID 8 wrote to memory of 2720 8 cmd.exe 97 PID 8 wrote to memory of 2720 8 cmd.exe 97 PID 8 wrote to memory of 2720 8 cmd.exe 97 PID 8 wrote to memory of 2720 8 cmd.exe 97 PID 8 wrote to memory of 2720 8 cmd.exe 97 PID 1868 wrote to memory of 2408 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 98 PID 1868 wrote to memory of 2408 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 98 PID 1868 wrote to memory of 2408 1868 67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe 98 PID 2408 wrote to memory of 2984 2408 u1fw.3.exe 102 PID 2408 wrote to memory of 2984 2408 u1fw.3.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe"C:\Users\Admin\AppData\Local\Temp\67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\u1fw.0.exe"C:\Users\Admin\AppData\Local\Temp\u1fw.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 23203⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1fw.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u1fw.2\run.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1fw.3.exe"C:\Users\Admin\AppData\Local\Temp\u1fw.3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 10682⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1868 -ip 18681⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 336 -ip 3361⤵PID:360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.4MB
MD56631abb81a0d0bea265c35868693a579
SHA1af4c5168891e93dd0e215351f75fa1106b4c1643
SHA2561170d673de9c4b4c3afdb895a77799e5ef4bb18c1a6762ccacb6e98e6ca0bdb0
SHA51254ce91c9cdb0a390a80e432f938e1f3a9a64bdfcf9149bb799c6b251b19d4018dc868c0a3c8f9f6326453e04a06e78daf7d46bd7fd30bf0a598f77305f319c03
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
291KB
MD5612893f3af1d76a58eddb1399cb8a75e
SHA1170080d0a93308ee7eabc2949a8f3342b809228c
SHA256e71a371b4619a44df81513dd372ea02741ebf9d6438624503ff432c45329a256
SHA5125c0a47a2a9a17dad4546601048d2b91447434f11eedce9629909c672c5e40edfa6c4ae101961c196fdccaa96bab5b428bd282bb9a6e5a96011e1c9a63c3541f7
-
Filesize
1.6MB
MD59bb67e904ac371b5ffd143f8fb54e1e2
SHA158009e463133af8b89b59716fe255b118eca872c
SHA25644afbc66f029be48db5d01678a0af7baf541e4a61d4b07391aa0470f0a961ded
SHA512573c196dc87a1d3ea22b3ebdd2be1e4fbfbd3ea431694ec5e503f5cc6717b7d63a478c5c981ba5b467176aadd352c92f1d026b60a28b8ff76390af6903c1cdc0
-
Filesize
224KB
MD53f109a02c8d642e8003a1188df40d861
SHA1f723f38471b8872443aa9177eef12a96c02cc84a
SHA2566523b44da6fa7078c7795b7705498e487b0625e28e15aec2d270c6e4a909b5a5
SHA512023696a52d48c465ab62e3ee754b445093b8a0ed0a232b430ce1f0db3dae382c9e1fba210c2b04d1018cc29bfb69c546976912f3939a76e98bcb792ae57af0da
-
Filesize
84KB
MD5e68562f63265e1a70881446b4b9dc455
SHA1da16ef9367bde3ce892b1a0e33bc179d8acdceb3
SHA256c8b16f1c6883a23021da37d9116a757f971fe919d64ef8f9dba17a7d8dd39adb
SHA5126bedea10a5b50f6e93e8566c18970c8ad1b8dfc7d5961069fc5d5216dcdded0b2a2ad8dd91f4ad80f8604d573a343c126df238ee5c448cdc26b899077957a674
-
Filesize
120KB
MD5f383f6f4e764619bd19e319335d3ef2b
SHA199f287e49a15e495b4ead8e5589364a5f87b357e
SHA25603951dfe05bf74c61568aed50b9d8ce5ecf0e0c2b8e73bc37e1a699ae7eebc9d
SHA5126fa960a084f42e6de25b74782d205c48ca9329997fc2ae8db902bb653da5e878ed92ced6b37472248d5bdc820fc48080ae4fce41556c4b20a049e30bf93d6934
-
Filesize
1.2MB
MD5f344794dc910dc343f92ded2c6b5e0ab
SHA1e5878518ce55ce5bd1890d5e04a82eb22d5a848a
SHA2563cf94707697ce0141960b05a15cbd3c3b791196995b1d21c4ff6bfb59997e235
SHA512ee00ad0c728c750b6c75001ba52df7ef367bebf1cbc01e2c9370dd42b1867b5347d5e68254f427dddde3214f2fae1341ab76c7faa3a4724e1d1d43fae97d3a58
-
Filesize
84KB
MD5a276acc3fd657d7665bd4ddce8fb9749
SHA1c02642eec3f4e8b0314045ee95e0a15abd853ea8
SHA2566565f36d224ff27d89ad39a0d87f851f64308834d86e8a7cd02e9e1ea44187c8
SHA512178476d229ff011cb1f39048acae46b42a80b2ec209b283a8237604646b09224446c5bb3a690191c4fd58813611d7c06b4fb23699cd76ad020a5d0bf4d456d79
-
Filesize
446KB
MD5485008b43f0edceba0e0d3ca04bc1c1a
SHA155ae8f105af415bb763d1b87f6572f078052877c
SHA25612c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10
SHA512402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954