Analysis
-
max time kernel
134s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe
Resource
win10v2004-20240508-en
General
-
Target
496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe
-
Size
1.0MB
-
MD5
585d16749fda38cb7f8a987137890167
-
SHA1
0b3f1064b2f0ddf397552e442e99e1c233c67df1
-
SHA256
496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5
-
SHA512
784c3a2e3fa3e90f57ed059a5bc204441da3ebc173a93b67e752f84cc2e2cf0f4ddc49aabeaa3233053e49d51633f6bb93a90c0735292084305b00bf79b2c632
-
SSDEEP
24576:23xZfO09c1MhIix2MZimC8GRPrvbyK5glhZ:23xhc1AIix2MUhRjvbyUe
Malware Config
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
105
-
token
xehook105401801
Signatures
-
Detect Xehook Payload 1 IoCs
resource yara_rule behavioral1/memory/1084-2-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 3712 4908 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe 1084 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1084 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90 PID 4908 wrote to memory of 1084 4908 496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe"C:\Users\Admin\AppData\Local\Temp\496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 2842⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4908 -ip 49081⤵PID:3792