Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe
Resource
win10v2004-20240508-en
General
-
Target
9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe
-
Size
2.0MB
-
MD5
b1e962e0aced0fecd607585e68525a10
-
SHA1
8a9eebbee5a90504f296d67d34079c9a6c602c10
-
SHA256
9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15
-
SHA512
056d5886b6ba4cbe8b525689f9461f25ca83873076c97d85e4ccf95b08e08f65313cf1675b67ff0bf8f85b27a699a16b3e60f8f35da2597b4bbcded0f200cc2e
-
SSDEEP
6144:7rb74D5EJNqOZQl3pOESErIOXoLbpCNr49+gOB+k6WQUoig934jrkolLyZH:Hb7q5EJNysCxXoLbmBBBIWloig5N+Ly
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Serverx = "C:\\Windows\\system32\\Serverx.exe" 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\H: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\J: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\S: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\G: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\K: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\N: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\O: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\I: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\L: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\P: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\Q: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\M: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\R: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened (read-only) \??\T: 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Serverx.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Windows\SysWOW64\Serverx.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2016 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 28 PID 1636 wrote to memory of 2016 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 28 PID 1636 wrote to memory of 2016 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 28 PID 1636 wrote to memory of 2016 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 28 PID 1636 wrote to memory of 1208 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 21 PID 1636 wrote to memory of 1208 1636 9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe"C:\Users\Admin\AppData\Local\Temp\9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe"C:\Users\Admin\AppData\Local\Temp\9d0856284929b3636ba00ee3f3b848d80312e076eb1d0dec125cbb3e389f5c15.exe"3⤵PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5edac5a9e8629403bad0502bb987d8577
SHA1588d19c78a51cb2f6c7f92bbc234b7a24f431ad1
SHA256c935ee4c162ab674f2597383f1b00d8abbab8542b74fb323b21cb10d8268399b
SHA512689965c668eb51769b80743cb5df2aff76cbece888ae70c583c34d04fbaa2497548cdd2c769de0bf8148cceeea0641f06b5b2018b688eb2337dca0262e9f4f13