Analysis

  • max time kernel
    359s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 19:54

General

  • Target

    g3ttroll1ed.exe

  • Size

    4.5MB

  • MD5

    33241a3aadf06404014353cfe3a47bac

  • SHA1

    a0bcbb2e7fde364d8f997b95303cd0c3b2e6b9fb

  • SHA256

    05e06e0f9ea0b245aff5f7aadeb69cce15e162effd29b4eec21bac3418ed414b

  • SHA512

    38e72ba8a3876b6d02606183ef671a566a1ce17f4d4923a4ca8a785b60b7240a0c7e29622dea05d3df176ef316a2712a59eba11d37234b4c34aab64dc98c773d

  • SSDEEP

    98304:/Qf3s64R9ybzUcwti78OqJ7TPBF3ZlHHgkWJ0P39qXSaDv:OzUcwti7TQlF3ZxxWJSUnDv

Score
9/10

Malware Config

Signatures

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\g3ttroll1ed.exe
    "C:\Users\Admin\AppData\Local\Temp\g3ttroll1ed.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe
      "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs60mxdU+lA2BbnUyqaxTaH4Jr31I/RkZECDvIySFqYbrtzscpDOyatJnxFkkqCDIcWouirC6gPXky74iFLNUGrji+iiHogYYHxmZt2qGHNUOVLDC/ED+Aoofqy96tUDWx8=
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Users\Admin\AppData\Local\Temp\bfsvc.exe
            C:\Users\Admin\AppData\Local\Temp\bfsvc.exe /capture /Filename "C:\Users\Admin\AppData\Local\Temp\capture.png"
            5⤵
            • Executes dropped EXE
            PID:3068
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe
            C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3024
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe
            C:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"
            5⤵
            • Executes dropped EXE
            PID:1936
          • C:\Users\Admin\AppData\Local\Temp\splwow64.exe
            C:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"
            5⤵
            • Executes dropped EXE
            PID:1772
          • C:\Users\Admin\AppData\Local\Temp\hh.exe
            C:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:620
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1176
          • C:\Users\Admin\AppData\Local\Temp\xwizard.exe
            C:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"
        3⤵
          PID:2104
          • C:\Windows\SysWOW64\choice.exe
            choice /C Y /N /D Y /T 3
            4⤵
              PID:2004

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\Cab2906.tmp

        Filesize

        67KB

        MD5

        2d3dcf90f6c99f47e7593ea250c9e749

        SHA1

        51be82be4a272669983313565b4940d4b1385237

        SHA256

        8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

        SHA512

        9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

      • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

        Filesize

        4.4MB

        MD5

        3405f654559010ca2ae38d786389f0f1

        SHA1

        8ac5552c64dfc3ccf0c678f6f946ee23719cf43d

        SHA256

        bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30

        SHA512

        cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b

      • C:\Users\Admin\AppData\Local\Temp\bfsvc.cfg

        Filesize

        420B

        MD5

        51c9e864182413f35b76d42d435df261

        SHA1

        dc5ec227ab38093927a119b4d646c3811c3553cd

        SHA256

        e6c5c674268a865db840afd3764cd498bdfd8fe677c5193d662abbe64d68975b

        SHA512

        b36e683b6487bfbf4e512214343128e57a52eb71356345caba70a98dc5b0bad764da842d08443d3b47bd3dddbe24af146c561ae480038c95f124a51565e3fd99

      • C:\Users\Admin\AppData\Local\Temp\compile.bat

        Filesize

        156B

        MD5

        eb51755b637423154d1341c6ee505f50

        SHA1

        d71d27e283b26e75e58c0d02f91d91a2e914c959

        SHA256

        db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9

        SHA512

        e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5

      • C:\Users\Admin\AppData\Local\Temp\compile.bat

        Filesize

        71B

        MD5

        91128da441ad667b8c54ebeadeca7525

        SHA1

        24b5c77fb68db64cba27c338e4373a455111a8cc

        SHA256

        50801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873

        SHA512

        bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd

      • C:\Users\Admin\AppData\Local\Temp\compile.bat

        Filesize

        70B

        MD5

        d90accebb3f79fe65cd938425c07b0ae

        SHA1

        9df3812a88d87dd419cd9e89afa5fb1d71be0dc9

        SHA256

        aca74cefaef4b7a32338c9c63187cffa1e808b54ab218a064007683ad1bd3a0e

        SHA512

        44013bfda1dbe5b217d4872e8d550cd00471cb8b969ffd6b07f83b0c59ac20ec2512d275a4603cc00e5de3a04666f66e897601ba51a5e02af622e5139ac04560

      • C:\Users\Admin\AppData\Local\Temp\compile.bat

        Filesize

        74B

        MD5

        808099bfbd62ec04f0ed44959bbc6160

        SHA1

        f4b6853d958c2c4416f6e4a5be8a11d86f64c023

        SHA256

        f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8

        SHA512

        e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0

      • C:\Users\Admin\AppData\Local\Temp\compile.vbs

        Filesize

        265B

        MD5

        ca906422a558f4bc9e471709f62ec1a9

        SHA1

        e3da070007fdeae52779964df6f71fcb697ffb06

        SHA256

        abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

        SHA512

        661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

      • C:\Users\Admin\AppData\Local\Temp\config

        Filesize

        107B

        MD5

        5cf0b95f68c3304427f858db1cdde895

        SHA1

        a0c5c3872307e9497f8868b9b8b956b9736a9cdf

        SHA256

        353de1200b65a2e89e84b32067a908103cca22ad2e51ba62c171eef3c25b73aa

        SHA512

        5c11c4ebcd4663d02ee3ffc19b7ec83b953dca7a7a1d2b63edaab72425a61e926ac940d99f2faa6b1baba0d28068e8f3ae64105990e0a0626ba02d8f979b455b

      • C:\Users\Admin\AppData\Local\Temp\hh.exe

        Filesize

        103KB

        MD5

        4d4c98eca32b14aeb074db34cd0881e4

        SHA1

        92f213d609bba05d41d6941652a88c44936663a4

        SHA256

        4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

        SHA512

        959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

      • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe

        Filesize

        391KB

        MD5

        053778713819beab3df309df472787cd

        SHA1

        99c7b5827df89b4fafc2b565abed97c58a3c65b8

        SHA256

        f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

        SHA512

        35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

      • C:\Users\Admin\AppData\Local\Temp\splwow64.exe

        Filesize

        49KB

        MD5

        0d8360781e488e250587a17fbefa646c

        SHA1

        29bc9b438efd70defa8fc45a6f8ee524143f6d04

        SHA256

        ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64

        SHA512

        940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e

      • C:\Users\Admin\AppData\Local\Temp\whysosad

        Filesize

        3KB

        MD5

        fc3c88c2080884d6c995d48e172fbc4f

        SHA1

        cb1dcc479ad2533f390786b0480f66296b847ad3

        SHA256

        1637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664

        SHA512

        4807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1

      • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe

        Filesize

        184KB

        MD5

        a776e68f497c996788b406a3dc5089eb

        SHA1

        45bf5e512752389fe71f20b64aa344f6ca0cad50

        SHA256

        071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1

        SHA512

        02b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073

      • C:\Users\Admin\AppData\Local\Temp\xwizard.cfg

        Filesize

        1KB

        MD5

        ae8eed5a6b1470aec0e7fece8b0669ef

        SHA1

        ca0e896f90c38f3a8bc679ea14c808726d8ef730

        SHA256

        3f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e

        SHA512

        e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6

      • \Users\Admin\AppData\Local\Temp\bfsvc.exe

        Filesize

        71KB

        MD5

        899d3ed011eb58459b8a4fc2b81f0924

        SHA1

        80361f1e0b93143ec1ddfee156760f5938c85791

        SHA256

        5e3f311ae67f046b56435067bcdd39fbf836fa0421fbc8c8b0e43e8e47524954

        SHA512

        802ee4f8d25417589c7e62f0acc9dc2dc8f1d32654ca435f6aeae2926e6900373648790451c9143856a772a49c2a8f3c8659c5b8260f0f67559aeef875825f05

      • \Users\Admin\AppData\Local\Temp\xwizard.exe

        Filesize

        544KB

        MD5

        df991217f1cfadd9acfa56f878da5ee7

        SHA1

        0b03b34cfb2985a840db279778ca828e69813116

        SHA256

        deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112

        SHA512

        175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316

      • memory/1772-132-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1936-128-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2416-115-0x0000000000170000-0x00000000001CB000-memory.dmp

        Filesize

        364KB

      • memory/2480-13-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/2480-42-0x0000000000650000-0x000000000065C000-memory.dmp

        Filesize

        48KB

      • memory/2480-46-0x00000000008C0000-0x00000000008CA000-memory.dmp

        Filesize

        40KB

      • memory/2480-45-0x0000000000D20000-0x0000000000D5C000-memory.dmp

        Filesize

        240KB

      • memory/2480-44-0x0000000000CF0000-0x0000000000D20000-memory.dmp

        Filesize

        192KB

      • memory/2480-43-0x00000000008A0000-0x00000000008BA000-memory.dmp

        Filesize

        104KB

      • memory/2480-48-0x0000000000320000-0x0000000000328000-memory.dmp

        Filesize

        32KB

      • memory/2480-10-0x00000000748EE000-0x00000000748EF000-memory.dmp

        Filesize

        4KB

      • memory/2480-80-0x0000000005200000-0x0000000005208000-memory.dmp

        Filesize

        32KB

      • memory/2480-47-0x0000000004770000-0x0000000004812000-memory.dmp

        Filesize

        648KB

      • memory/2480-131-0x00000000748EE000-0x00000000748EF000-memory.dmp

        Filesize

        4KB

      • memory/2480-136-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/2480-79-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

        Filesize

        32KB

      • memory/2480-181-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/2480-12-0x00000000046C0000-0x0000000004770000-memory.dmp

        Filesize

        704KB

      • memory/2480-11-0x0000000000E40000-0x00000000012BA000-memory.dmp

        Filesize

        4.5MB

      • memory/2644-0-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

        Filesize

        4KB

      • memory/2644-1-0x0000000000170000-0x00000000005EE000-memory.dmp

        Filesize

        4.5MB

      • memory/2644-124-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

        Filesize

        4KB