Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe
Resource
win7-20240221-en
General
-
Target
4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe
-
Size
126KB
-
MD5
6182f0d38783485a9ead962a6869327a
-
SHA1
965a5be418baa9372688838aa4052a20e5ab4631
-
SHA256
4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d
-
SHA512
04235000d610d189ed73b36e9cfd2a359e9885335e96ffa0276b1a0babd001f8a653e80c0f37b6fc428d97110b19cb2b19149b45eb02193e8b8e0b317e8279c4
-
SSDEEP
3072:Z8ra+p+6/mf21inVtQ1OUpdkT+clARIw06c:bcq21YQ1gCi
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2288 netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 1752 ipconfig.exe 2212 NETSTAT.EXE 2300 NETSTAT.EXE 1628 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
tasklist.exepid process 2552 tasklist.exe 2552 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeWMIC.exeWMIC.exedescription pid process Token: SeRestorePrivilege 2752 msiexec.exe Token: SeTakeOwnershipPrivilege 2752 msiexec.exe Token: SeSecurityPrivilege 2752 msiexec.exe Token: SeIncreaseQuotaPrivilege 2172 WMIC.exe Token: SeSecurityPrivilege 2172 WMIC.exe Token: SeTakeOwnershipPrivilege 2172 WMIC.exe Token: SeLoadDriverPrivilege 2172 WMIC.exe Token: SeSystemProfilePrivilege 2172 WMIC.exe Token: SeSystemtimePrivilege 2172 WMIC.exe Token: SeProfSingleProcessPrivilege 2172 WMIC.exe Token: SeIncBasePriorityPrivilege 2172 WMIC.exe Token: SeCreatePagefilePrivilege 2172 WMIC.exe Token: SeBackupPrivilege 2172 WMIC.exe Token: SeRestorePrivilege 2172 WMIC.exe Token: SeShutdownPrivilege 2172 WMIC.exe Token: SeDebugPrivilege 2172 WMIC.exe Token: SeSystemEnvironmentPrivilege 2172 WMIC.exe Token: SeRemoteShutdownPrivilege 2172 WMIC.exe Token: SeUndockPrivilege 2172 WMIC.exe Token: SeManageVolumePrivilege 2172 WMIC.exe Token: 33 2172 WMIC.exe Token: 34 2172 WMIC.exe Token: 35 2172 WMIC.exe Token: SeIncreaseQuotaPrivilege 2172 WMIC.exe Token: SeSecurityPrivilege 2172 WMIC.exe Token: SeTakeOwnershipPrivilege 2172 WMIC.exe Token: SeLoadDriverPrivilege 2172 WMIC.exe Token: SeSystemProfilePrivilege 2172 WMIC.exe Token: SeSystemtimePrivilege 2172 WMIC.exe Token: SeProfSingleProcessPrivilege 2172 WMIC.exe Token: SeIncBasePriorityPrivilege 2172 WMIC.exe Token: SeCreatePagefilePrivilege 2172 WMIC.exe Token: SeBackupPrivilege 2172 WMIC.exe Token: SeRestorePrivilege 2172 WMIC.exe Token: SeShutdownPrivilege 2172 WMIC.exe Token: SeDebugPrivilege 2172 WMIC.exe Token: SeSystemEnvironmentPrivilege 2172 WMIC.exe Token: SeRemoteShutdownPrivilege 2172 WMIC.exe Token: SeUndockPrivilege 2172 WMIC.exe Token: SeManageVolumePrivilege 2172 WMIC.exe Token: 33 2172 WMIC.exe Token: 34 2172 WMIC.exe Token: 35 2172 WMIC.exe Token: SeIncreaseQuotaPrivilege 2180 WMIC.exe Token: SeSecurityPrivilege 2180 WMIC.exe Token: SeTakeOwnershipPrivilege 2180 WMIC.exe Token: SeLoadDriverPrivilege 2180 WMIC.exe Token: SeSystemProfilePrivilege 2180 WMIC.exe Token: SeSystemtimePrivilege 2180 WMIC.exe Token: SeProfSingleProcessPrivilege 2180 WMIC.exe Token: SeIncBasePriorityPrivilege 2180 WMIC.exe Token: SeCreatePagefilePrivilege 2180 WMIC.exe Token: SeBackupPrivilege 2180 WMIC.exe Token: SeRestorePrivilege 2180 WMIC.exe Token: SeShutdownPrivilege 2180 WMIC.exe Token: SeDebugPrivilege 2180 WMIC.exe Token: SeSystemEnvironmentPrivilege 2180 WMIC.exe Token: SeRemoteShutdownPrivilege 2180 WMIC.exe Token: SeUndockPrivilege 2180 WMIC.exe Token: SeManageVolumePrivilege 2180 WMIC.exe Token: 33 2180 WMIC.exe Token: 34 2180 WMIC.exe Token: 35 2180 WMIC.exe Token: SeIncreaseQuotaPrivilege 2180 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.execmd.exenet.exedescription pid process target process PID 2856 wrote to memory of 1272 2856 4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe cmd.exe PID 2856 wrote to memory of 1272 2856 4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe cmd.exe PID 2856 wrote to memory of 1272 2856 4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe cmd.exe PID 1272 wrote to memory of 2172 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2172 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2172 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2180 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2180 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2180 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1584 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1584 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1584 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1576 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1576 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1576 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2040 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2040 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2040 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 444 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 444 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 444 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 3012 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 3012 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 3012 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1296 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1296 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1296 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1712 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1712 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1712 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 108 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 108 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 108 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 544 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 544 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 544 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 932 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 932 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 932 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2104 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2104 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2104 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2216 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2216 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 2216 1272 cmd.exe WMIC.exe PID 1272 wrote to memory of 1752 1272 cmd.exe ipconfig.exe PID 1272 wrote to memory of 1752 1272 cmd.exe ipconfig.exe PID 1272 wrote to memory of 1752 1272 cmd.exe ipconfig.exe PID 1272 wrote to memory of 1952 1272 cmd.exe ROUTE.EXE PID 1272 wrote to memory of 1952 1272 cmd.exe ROUTE.EXE PID 1272 wrote to memory of 1952 1272 cmd.exe ROUTE.EXE PID 1272 wrote to memory of 2288 1272 cmd.exe netsh.exe PID 1272 wrote to memory of 2288 1272 cmd.exe netsh.exe PID 1272 wrote to memory of 2288 1272 cmd.exe netsh.exe PID 1272 wrote to memory of 2224 1272 cmd.exe systeminfo.exe PID 1272 wrote to memory of 2224 1272 cmd.exe systeminfo.exe PID 1272 wrote to memory of 2224 1272 cmd.exe systeminfo.exe PID 1272 wrote to memory of 2552 1272 cmd.exe tasklist.exe PID 1272 wrote to memory of 2552 1272 cmd.exe tasklist.exe PID 1272 wrote to memory of 2552 1272 cmd.exe tasklist.exe PID 1272 wrote to memory of 2536 1272 cmd.exe net.exe PID 1272 wrote to memory of 2536 1272 cmd.exe net.exe PID 1272 wrote to memory of 2536 1272 cmd.exe net.exe PID 2536 wrote to memory of 1972 2536 net.exe net1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe"C:\Users\Admin\AppData\Local\Temp\4ab39abb36148d3ff921833c0d03ed1c7a8116c1a8993210bcfe1565f558107d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\cmd.execmd2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv3⤵PID:1584
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv3⤵PID:1576
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv3⤵PID:2040
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv3⤵PID:444
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv3⤵PID:3012
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv3⤵PID:1296
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv3⤵PID:1712
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv3⤵PID:108
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv3⤵PID:544
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv3⤵PID:932
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv3⤵PID:2104
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv3⤵PID:2216
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns3⤵
- Gathers network information
PID:1752 -
C:\Windows\system32\ROUTE.EXEroute print3⤵PID:1952
-
C:\Windows\system32\netsh.exenetsh firewall show state3⤵
- Modifies Windows Firewall
PID:2288 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2224 -
C:\Windows\system32\tasklist.exetasklist /v /fo csv3⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\system32\net.exenet accounts /domain3⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain4⤵PID:1972
-
C:\Windows\system32\net.exenet share3⤵PID:2596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share4⤵PID:2440
-
C:\Windows\system32\net.exenet user3⤵PID:2584
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:2284
-
C:\Windows\system32\net.exenet user /domain3⤵PID:2532
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain4⤵PID:2416
-
C:\Windows\system32\net.exenet use3⤵PID:2492
-
C:\Windows\system32\net.exenet group3⤵PID:2480
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group4⤵PID:2816
-
C:\Windows\system32\net.exenet localgroup3⤵PID:2812
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup4⤵PID:3024
-
C:\Windows\system32\NETSTAT.EXEnetstat -r3⤵
- Gathers network information
PID:2212 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print4⤵PID:1788
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print5⤵PID:2144
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao3⤵
- Gathers network information
PID:2300 -
C:\Windows\system32\schtasks.exeschtasks /query /fo LIST3⤵PID:1868
-
C:\Windows\system32\net.exenet start3⤵PID:1332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start4⤵PID:1180
-
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1628 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2856 -s 6802⤵PID:2340
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e