Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe
Resource
win7-20240508-en
General
-
Target
bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe
-
Size
126KB
-
MD5
5f3c137a22cfa683c791e8b0cc2283c4
-
SHA1
874dd301d52fbc6bf170c561b396691c99c0479d
-
SHA256
bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb
-
SHA512
1ce56739e3514850808928134c8a7221f29d530737b50bd4c4bc6126d49a5c18e1bbf13af6a8bf2be98dea4b3e58d5e4a288bef4930e3770c6a82f7b58442e03
-
SSDEEP
3072:z8ra+p+6/mf21inVtQ1OUpdkT+clARIw06c:Jcq21YQ1gCi
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2236 netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 2228 ipconfig.exe 2596 NETSTAT.EXE 1388 NETSTAT.EXE 2832 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
tasklist.exepid process 1608 tasklist.exe 1608 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exeWMIC.exeWMIC.exedescription pid process Token: SeRestorePrivilege 2628 msiexec.exe Token: SeTakeOwnershipPrivilege 2628 msiexec.exe Token: SeSecurityPrivilege 2628 msiexec.exe Token: SeIncreaseQuotaPrivilege 468 WMIC.exe Token: SeSecurityPrivilege 468 WMIC.exe Token: SeTakeOwnershipPrivilege 468 WMIC.exe Token: SeLoadDriverPrivilege 468 WMIC.exe Token: SeSystemProfilePrivilege 468 WMIC.exe Token: SeSystemtimePrivilege 468 WMIC.exe Token: SeProfSingleProcessPrivilege 468 WMIC.exe Token: SeIncBasePriorityPrivilege 468 WMIC.exe Token: SeCreatePagefilePrivilege 468 WMIC.exe Token: SeBackupPrivilege 468 WMIC.exe Token: SeRestorePrivilege 468 WMIC.exe Token: SeShutdownPrivilege 468 WMIC.exe Token: SeDebugPrivilege 468 WMIC.exe Token: SeSystemEnvironmentPrivilege 468 WMIC.exe Token: SeRemoteShutdownPrivilege 468 WMIC.exe Token: SeUndockPrivilege 468 WMIC.exe Token: SeManageVolumePrivilege 468 WMIC.exe Token: 33 468 WMIC.exe Token: 34 468 WMIC.exe Token: 35 468 WMIC.exe Token: SeIncreaseQuotaPrivilege 468 WMIC.exe Token: SeSecurityPrivilege 468 WMIC.exe Token: SeTakeOwnershipPrivilege 468 WMIC.exe Token: SeLoadDriverPrivilege 468 WMIC.exe Token: SeSystemProfilePrivilege 468 WMIC.exe Token: SeSystemtimePrivilege 468 WMIC.exe Token: SeProfSingleProcessPrivilege 468 WMIC.exe Token: SeIncBasePriorityPrivilege 468 WMIC.exe Token: SeCreatePagefilePrivilege 468 WMIC.exe Token: SeBackupPrivilege 468 WMIC.exe Token: SeRestorePrivilege 468 WMIC.exe Token: SeShutdownPrivilege 468 WMIC.exe Token: SeDebugPrivilege 468 WMIC.exe Token: SeSystemEnvironmentPrivilege 468 WMIC.exe Token: SeRemoteShutdownPrivilege 468 WMIC.exe Token: SeUndockPrivilege 468 WMIC.exe Token: SeManageVolumePrivilege 468 WMIC.exe Token: 33 468 WMIC.exe Token: 34 468 WMIC.exe Token: 35 468 WMIC.exe Token: SeIncreaseQuotaPrivilege 2476 WMIC.exe Token: SeSecurityPrivilege 2476 WMIC.exe Token: SeTakeOwnershipPrivilege 2476 WMIC.exe Token: SeLoadDriverPrivilege 2476 WMIC.exe Token: SeSystemProfilePrivilege 2476 WMIC.exe Token: SeSystemtimePrivilege 2476 WMIC.exe Token: SeProfSingleProcessPrivilege 2476 WMIC.exe Token: SeIncBasePriorityPrivilege 2476 WMIC.exe Token: SeCreatePagefilePrivilege 2476 WMIC.exe Token: SeBackupPrivilege 2476 WMIC.exe Token: SeRestorePrivilege 2476 WMIC.exe Token: SeShutdownPrivilege 2476 WMIC.exe Token: SeDebugPrivilege 2476 WMIC.exe Token: SeSystemEnvironmentPrivilege 2476 WMIC.exe Token: SeRemoteShutdownPrivilege 2476 WMIC.exe Token: SeUndockPrivilege 2476 WMIC.exe Token: SeManageVolumePrivilege 2476 WMIC.exe Token: 33 2476 WMIC.exe Token: 34 2476 WMIC.exe Token: 35 2476 WMIC.exe Token: SeIncreaseQuotaPrivilege 2476 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.execmd.exenet.exedescription pid process target process PID 3016 wrote to memory of 1996 3016 bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe cmd.exe PID 3016 wrote to memory of 1996 3016 bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe cmd.exe PID 3016 wrote to memory of 1996 3016 bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe cmd.exe PID 1996 wrote to memory of 468 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 468 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 468 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2476 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2476 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2476 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1808 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1808 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1808 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 544 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 544 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 544 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2768 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2768 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2768 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2496 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2496 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2496 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 684 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 684 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 684 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2224 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2224 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2224 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1064 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1064 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1064 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1592 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1592 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1592 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1352 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1352 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1352 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2356 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2356 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2356 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1652 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1652 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1652 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1028 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1028 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 1028 1996 cmd.exe WMIC.exe PID 1996 wrote to memory of 2228 1996 cmd.exe ipconfig.exe PID 1996 wrote to memory of 2228 1996 cmd.exe ipconfig.exe PID 1996 wrote to memory of 2228 1996 cmd.exe ipconfig.exe PID 1996 wrote to memory of 844 1996 cmd.exe ROUTE.EXE PID 1996 wrote to memory of 844 1996 cmd.exe ROUTE.EXE PID 1996 wrote to memory of 844 1996 cmd.exe ROUTE.EXE PID 1996 wrote to memory of 2236 1996 cmd.exe netsh.exe PID 1996 wrote to memory of 2236 1996 cmd.exe netsh.exe PID 1996 wrote to memory of 2236 1996 cmd.exe netsh.exe PID 1996 wrote to memory of 2164 1996 cmd.exe systeminfo.exe PID 1996 wrote to memory of 2164 1996 cmd.exe systeminfo.exe PID 1996 wrote to memory of 2164 1996 cmd.exe systeminfo.exe PID 1996 wrote to memory of 1608 1996 cmd.exe tasklist.exe PID 1996 wrote to memory of 1608 1996 cmd.exe tasklist.exe PID 1996 wrote to memory of 1608 1996 cmd.exe tasklist.exe PID 1996 wrote to memory of 2676 1996 cmd.exe net.exe PID 1996 wrote to memory of 2676 1996 cmd.exe net.exe PID 1996 wrote to memory of 2676 1996 cmd.exe net.exe PID 2676 wrote to memory of 2648 2676 net.exe net1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe"C:\Users\Admin\AppData\Local\Temp\bce98fb5fb2b993925218e9fef94616868a40ebf2f5ebdf1ba58a201ca2cd6bb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\cmd.execmd2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv3⤵
- Suspicious use of AdjustPrivilegeToken
PID:468 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv3⤵PID:1808
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv3⤵PID:544
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv3⤵PID:2768
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv3⤵PID:2496
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv3⤵PID:684
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv3⤵PID:2224
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv3⤵PID:1064
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv3⤵PID:1592
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv3⤵PID:1352
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv3⤵PID:2356
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv3⤵PID:1652
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv3⤵PID:1028
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns3⤵
- Gathers network information
PID:2228 -
C:\Windows\system32\ROUTE.EXEroute print3⤵PID:844
-
C:\Windows\system32\netsh.exenetsh firewall show state3⤵
- Modifies Windows Firewall
PID:2236 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2164 -
C:\Windows\system32\tasklist.exetasklist /v /fo csv3⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\system32\net.exenet accounts /domain3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain4⤵PID:2648
-
C:\Windows\system32\net.exenet share3⤵PID:2792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share4⤵PID:2532
-
C:\Windows\system32\net.exenet user3⤵PID:1724
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:2948
-
C:\Windows\system32\net.exenet user /domain3⤵PID:2784
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain4⤵PID:2612
-
C:\Windows\system32\net.exenet use3⤵PID:2660
-
C:\Windows\system32\net.exenet group3⤵PID:2636
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group4⤵PID:2524
-
C:\Windows\system32\net.exenet localgroup3⤵PID:2520
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup4⤵PID:2540
-
C:\Windows\system32\NETSTAT.EXEnetstat -r3⤵
- Gathers network information
PID:2596 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print4⤵PID:3028
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print5⤵PID:2600
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao3⤵
- Gathers network information
PID:1388 -
C:\Windows\system32\schtasks.exeschtasks /query /fo LIST3⤵PID:3040
-
C:\Windows\system32\net.exenet start3⤵PID:2240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start4⤵PID:1992
-
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2832 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3016 -s 6802⤵PID:2888
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e