Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
PIC0502502016-JPEG.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PIC0502502016-JPEG.exe
Resource
win10v2004-20240508-en
General
-
Target
PIC0502502016-JPEG.exe
-
Size
164KB
-
MD5
59ba34ea33c58125c0526bb2632ac424
-
SHA1
7e95f34f12771125764b21675f614cb9cc770d13
-
SHA256
952bf30d5b8964b441f3c70a3f41f8db5569c8285baa07d903bac94d580eae7e
-
SHA512
724a2282adccc42a029d7e97167273815904a95484a0d62e19a1041c606dcce094dfee5f77dcb034b1c1334d3297a9fc725a3d363365c512764083541269bf83
-
SSDEEP
3072:4vf0KfRASu/rLef4BO8a6Or8gmb57Bv/dXS0/j:4tfSSua4BO3608nb57Bv/lSyj
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" PIC0502502016-JPEG.exe -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 winmgr.exe 2972 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-505005393635246320495930953230302040\\winmgr.exe" PIC0502502016-JPEG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-505005393635246320495930953230302040\\winmgr.exe" PIC0502502016-JPEG.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3028 set thread context of 2656 3028 PIC0502502016-JPEG.exe 28 PID 2600 set thread context of 2972 2600 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\M-505005393635246320495930953230302040 PIC0502502016-JPEG.exe File created C:\Windows\M-505005393635246320495930953230302040\winmgr.exe PIC0502502016-JPEG.exe File opened for modification C:\Windows\M-505005393635246320495930953230302040\winmgr.exe PIC0502502016-JPEG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PIC0502502016-JPEG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PIC0502502016-JPEG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 PIC0502502016-JPEG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PIC0502502016-JPEG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2656 PIC0502502016-JPEG.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe 2972 winmgr.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 3028 wrote to memory of 2656 3028 PIC0502502016-JPEG.exe 28 PID 2656 wrote to memory of 2600 2656 PIC0502502016-JPEG.exe 29 PID 2656 wrote to memory of 2600 2656 PIC0502502016-JPEG.exe 29 PID 2656 wrote to memory of 2600 2656 PIC0502502016-JPEG.exe 29 PID 2656 wrote to memory of 2600 2656 PIC0502502016-JPEG.exe 29 PID 2656 wrote to memory of 2608 2656 PIC0502502016-JPEG.exe 30 PID 2656 wrote to memory of 2608 2656 PIC0502502016-JPEG.exe 30 PID 2656 wrote to memory of 2608 2656 PIC0502502016-JPEG.exe 30 PID 2656 wrote to memory of 2608 2656 PIC0502502016-JPEG.exe 30 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32 PID 2600 wrote to memory of 2972 2600 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\PIC0502502016-JPEG.exe"C:\Users\Admin\AppData\Local\Temp\PIC0502502016-JPEG.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\PIC0502502016-JPEG.exe"C:\Users\Admin\AppData\Local\Temp\PIC0502502016-JPEG.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\M-505005393635246320495930953230302040\winmgr.exeC:\Windows\M-505005393635246320495930953230302040\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\M-505005393635246320495930953230302040\winmgr.exe"C:\Windows\M-505005393635246320495930953230302040\winmgr.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\exlyymsjpt.bat" "3⤵
- Deletes itself
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5b417688f58e3283b3ed390d1f6abf409
SHA1e759f1c9ff1f7816b68f591ed196bff98b6e94b9
SHA25621334b0e093f62a5aad7fd871e542f39f70e836f3f3a785133d964846d3aae53
SHA5127b2dd0991dd11f5368cbc390a664734ccb918b21a5fee49cefd1a7294fe3afd20cd822d179ba4574f00f3378c48c67997a6320821de77a8a08f8b89bce3e1d81
-
Filesize
164KB
MD559ba34ea33c58125c0526bb2632ac424
SHA17e95f34f12771125764b21675f614cb9cc770d13
SHA256952bf30d5b8964b441f3c70a3f41f8db5569c8285baa07d903bac94d580eae7e
SHA512724a2282adccc42a029d7e97167273815904a95484a0d62e19a1041c606dcce094dfee5f77dcb034b1c1334d3297a9fc725a3d363365c512764083541269bf83