Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
ZAMOWIEN.exe
Resource
win7-20240508-en
General
-
Target
ZAMOWIEN.exe
-
Size
1.4MB
-
MD5
a7afb929a4be723fd2c352dad4197c6c
-
SHA1
1357ae925d422ba0b98f14322e73de0cf88e6903
-
SHA256
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a
-
SHA512
418fde024c04c7e17391d325f06eb0ff6b1ac3bda83e333749e824746688549972eab1a32799a78c24ed6c0df83369536c6d00a4d7b42e503a5c9bdb016e7d7f
-
SSDEEP
24576:yn25nPkW3amy8sQxeWcktTjbJ4/auDyEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKr:yn2kGy7wTjbq/DyEEEEEEEEEEEEEEEEm
Malware Config
Extracted
Protocol: ftp- Host:
ftp.rusticpensiune.ro - Port:
21 - Username:
[email protected] - Password:
99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 kmsdfhlV.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1592 set thread context of 3068 1592 ZAMOWIEN.exe 101 -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3068 kmsdfhlV.pif 3068 kmsdfhlV.pif 3068 kmsdfhlV.pif -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 kmsdfhlV.pif -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3068 1592 ZAMOWIEN.exe 101 PID 1592 wrote to memory of 3068 1592 ZAMOWIEN.exe 101 PID 1592 wrote to memory of 3068 1592 ZAMOWIEN.exe 101 PID 1592 wrote to memory of 3068 1592 ZAMOWIEN.exe 101 PID 1592 wrote to memory of 3068 1592 ZAMOWIEN.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.exe"C:\Users\Admin\AppData\Local\Temp\ZAMOWIEN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Public\Libraries\kmsdfhlV.pifC:\Users\Public\Libraries\kmsdfhlV.pif2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4268,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6