Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe
Resource
win10v2004-20240508-en
General
-
Target
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe
-
Size
1.2MB
-
MD5
09243c189e130abbad104ea1c6b8cb20
-
SHA1
b9d2b540b8678055e67c45206deb1d34c777f41d
-
SHA256
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b
-
SHA512
cb1e9d62d3f8514bbbbe52df75b486df8e01281ee0dcccf0c49cb6d6d22074c012ae2afcb4a49d7f1c21b653bfd2e53a0ea98ca9fa69831684dd98fc5a0457bd
-
SSDEEP
12288:rBVMpWCRvZA3R7bAaoufVa5ijnrdmBah2b9QsRYfBoEz2MUHakRZYuvAieR5+nQm:rbWvZGVdvfdfh2MBt2MU6uZvrfOa9
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exedescription ioc process File opened (read-only) \??\M: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\S: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\Q: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\I: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\J: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\O: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\R: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\T: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\G: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\L: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\P: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\N: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\E: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\H: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened (read-only) \??\K: 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe -
Drops file in System32 directory 2 IoCs
Processes:
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exedescription ioc process File created C:\Windows\SysWOW64\Serverx.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2412 2172 WerFault.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exedescription pid process target process PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 1692 wrote to memory of 2172 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe PID 2172 wrote to memory of 2412 2172 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe PID 2172 wrote to memory of 2412 2172 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe PID 2172 wrote to memory of 2412 2172 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe PID 2172 wrote to memory of 2412 2172 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe PID 1692 wrote to memory of 2412 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe PID 1692 wrote to memory of 2412 1692 328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe"C:\Users\Admin\AppData\Local\Temp\328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe"C:\Users\Admin\AppData\Local\Temp\328256138d4de1ad16ea72dc993333296f09e32b2c5c409d02f653b7daf25c3b.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 2443⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ose00000.exeFilesize
150KB
MD5abb7e491f55303a13ab1993b083f951a
SHA1281bbf17b1d6157ee9a30152a7f3d8b96d8fd77d
SHA256204a4b6dcbcb9c1a694637e242e26014ce4cc2097fde69e9406e5446768cacea
SHA5126fbe4cd29a8ab33639f8dcfa45a76c97e2fd1034b3d10e9eea56c65a0dd2c19deeb8abef1d4ad2e5f18e09588661065d392ff429c8d1d2fda35a44d946f50340
-
memory/1692-0-0x0000000000350000-0x00000000004E5B26-memory.dmpFilesize
1.6MB
-
memory/1692-1-0x0000000002000000-0x0000000002196000-memory.dmpFilesize
1.6MB
-
memory/1692-3-0x0000000000350000-0x00000000004E5B26-memory.dmpFilesize
1.6MB
-
memory/1692-4-0x0000000002000000-0x0000000002196000-memory.dmpFilesize
1.6MB
-
memory/2172-2-0x0000000000350000-0x00000000004E5B26-memory.dmpFilesize
1.6MB
-
memory/2412-10-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/2412-8-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/2412-6-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB