Analysis
-
max time kernel
76s -
max time network
192s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe
Resource
win7-20240221-en
General
-
Target
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe
-
Size
314KB
-
MD5
d1ec6dbbe13ed8451b267702350c12c6
-
SHA1
85137de6a39adaea4593bdeb7145ad55a578b397
-
SHA256
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600
-
SHA512
cb56c17fc95f7ddc0ec885e992a7dbf1f9d4fa0890cb5d652fff88c6ec13c2f5f681389415edebfefee0d07d8c5d50af242d13887eaa61a9031908d7d790f750
-
SSDEEP
6144:+68xYCR6hv9DonM3v6nNTzXvf0ru+UePpzJfww7TR5Me9a6n:T8xYCS6nxf0r3UqBJJ5TFn
Malware Config
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
108
-
token
xehook108709660
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4736-2-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exedescription pid Process procid_target PID 4372 set thread context of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 4736 RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exeRegAsm.execmd.exedescription pid Process procid_target PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4372 wrote to memory of 4736 4372 ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe 73 PID 4736 wrote to memory of 1292 4736 RegAsm.exe 75 PID 4736 wrote to memory of 1292 4736 RegAsm.exe 75 PID 4736 wrote to memory of 1292 4736 RegAsm.exe 75 PID 1292 wrote to memory of 4520 1292 cmd.exe 77 PID 1292 wrote to memory of 4520 1292 cmd.exe 77 PID 1292 wrote to memory of 4520 1292 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe"C:\Users\Admin\AppData\Local\Temp\ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delete.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:4520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD5fc7814d37c2c33c99754f0872f113bb7
SHA1a0fccd951eb74bce77dfbd69180d7b140a28ba68
SHA256f15bcd8b8a067a2b2785fae54701fe001242e05412e2cf062cb91bd48d912d49
SHA512900e292acf1caeb09755685b5096fb72c2c0fc5f9ae41a63e2dfbee00004bd2ed7be55c223bac3b19b837823add48b6876568f4c69fb407b132b6f46583ebce2