Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
1dbe4ba8f382a47c48facfd9360fac10.exe
Resource
win7-20240220-en
General
-
Target
1dbe4ba8f382a47c48facfd9360fac10.exe
-
Size
353KB
-
MD5
1dbe4ba8f382a47c48facfd9360fac10
-
SHA1
08b5c20e80e71abfaa842697a1e9ed3ee76feeee
-
SHA256
b9e5ab4620dc672f82c5d9d32459fd7a6a13960be269d8b13b8b4b6a1a33cf66
-
SHA512
8920aff361ff91c18a08b16076215c30f4fc7c8ffd0de9fa822698c66165324545a20103d971f5e093c147cd5987d85ad9fb64969eba4ea67fc728641b13e992
-
SSDEEP
6144:3YidRQfaVJpx3VZiYbEhYPQTEy/gbs4z5OOhChUU3V8i84hx7SJuV5erUuiLEO:3RaaVJpxb0wyKsK5xhdiJScXeLiLEO
Malware Config
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
174
-
token
xehook174464555
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4992-2-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1dbe4ba8f382a47c48facfd9360fac10.exedescription pid Process procid_target PID 3616 set thread context of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 4992 RegAsm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
1dbe4ba8f382a47c48facfd9360fac10.exedescription pid Process procid_target PID 3616 wrote to memory of 2608 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 85 PID 3616 wrote to memory of 2608 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 85 PID 3616 wrote to memory of 2608 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 85 PID 3616 wrote to memory of 4252 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 86 PID 3616 wrote to memory of 4252 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 86 PID 3616 wrote to memory of 4252 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 86 PID 3616 wrote to memory of 4492 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 87 PID 3616 wrote to memory of 4492 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 87 PID 3616 wrote to memory of 4492 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 87 PID 3616 wrote to memory of 2612 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 88 PID 3616 wrote to memory of 2612 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 88 PID 3616 wrote to memory of 2612 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 88 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89 PID 3616 wrote to memory of 4992 3616 1dbe4ba8f382a47c48facfd9360fac10.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dbe4ba8f382a47c48facfd9360fac10.exe"C:\Users\Admin\AppData\Local\Temp\1dbe4ba8f382a47c48facfd9360fac10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4252
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-