Analysis
-
max time kernel
147s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe
Resource
win7-20231129-en
General
-
Target
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe
-
Size
1.4MB
-
MD5
a7afb929a4be723fd2c352dad4197c6c
-
SHA1
1357ae925d422ba0b98f14322e73de0cf88e6903
-
SHA256
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a
-
SHA512
418fde024c04c7e17391d325f06eb0ff6b1ac3bda83e333749e824746688549972eab1a32799a78c24ed6c0df83369536c6d00a4d7b42e503a5c9bdb016e7d7f
-
SSDEEP
24576:yn25nPkW3amy8sQxeWcktTjbJ4/auDyEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKr:yn2kGy7wTjbq/DyEEEEEEEEEEEEEEEEm
Malware Config
Extracted
Protocol: ftp- Host:
ftp.rusticpensiune.ro - Port:
21 - Username:
[email protected] - Password:
99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
Signatures
-
Detect packed .NET executables. Mostly AgentTeslaV4. 33 IoCs
Processes:
resource yara_rule behavioral2/memory/4860-10-0x0000000049800000-0x000000004985A000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-13-0x000000004C130000-0x000000004C18A000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-22-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-38-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-36-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-70-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-75-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-72-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-68-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-64-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-62-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-61-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-58-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-66-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-56-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-54-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-52-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-50-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-48-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-46-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-44-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-42-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-40-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-34-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-32-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-30-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-28-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-26-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-24-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-20-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-18-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-16-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/4860-15-0x000000004C130000-0x000000004C183000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Executes dropped EXE 1 IoCs
Processes:
kmsdfhlV.pifpid process 4860 kmsdfhlV.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exedescription pid process target process PID 3452 set thread context of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
kmsdfhlV.pifpid process 4860 kmsdfhlV.pif 4860 kmsdfhlV.pif -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
kmsdfhlV.pifdescription pid process Token: SeDebugPrivilege 4860 kmsdfhlV.pif -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exedescription pid process target process PID 3452 wrote to memory of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif PID 3452 wrote to memory of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif PID 3452 wrote to memory of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif PID 3452 wrote to memory of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif PID 3452 wrote to memory of 4860 3452 616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe kmsdfhlV.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe"C:\Users\Admin\AppData\Local\Temp\616441c74c95a52ec38217d221e79cee12ec87dc0e7276059b5be1274382dd5a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Public\Libraries\kmsdfhlV.pifC:\Users\Public\Libraries\kmsdfhlV.pif2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6