Analysis

  • max time kernel
    110s
  • max time network
    113s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/07/2024, 21:31

General

  • Target

    System.scr

  • Size

    183KB

  • MD5

    7d17713fc862d6a8e99d21886724b326

  • SHA1

    ecc9378bfe46d03d4c9cfe3ca5e064e93712644c

  • SHA256

    d5feaa594c1402ac14cf911dbe520b2d5670b732d8203c3fd035d96483c605fa

  • SHA512

    8953fec9e3d1248fd8fade518de35c17233ebbdab2f9d2b899203c54a92db76f9aef62a209342fbec00667179105ffbbcae00aee35020119609bceb451bcfef2

  • SSDEEP

    3072:SurlxKc8HZde2vBVQF4EWjFRA229YvepcCBKX/p6:hrl8deAVQF4EWx92iepcCBKv

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\System.scr
    "C:\Users\Admin\AppData\Local\Temp\System.scr" /S
    1⤵
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Users\Admin\AppData\Roaming\Windows\System.exe
      "C:\Users\Admin\AppData\Roaming\Windows\System.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:3492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\melt.txt

    Filesize

    44B

    MD5

    f6cc26c8de4d73281a6648d65560678e

    SHA1

    90220c982ff30ab822bfa0cc790b4e74604d9dd1

    SHA256

    2ecdc7857187ed701cd6166d5a81c05a1e1ed2f585cf89d3319a9a9bd90ee886

    SHA512

    ed90074aa7674585558335015aeaa504420e1c4c2a5708634c31497fcc44aa8eb4270cc00207fd7672e34ea3263adc43461c9f9a705cc9161db7b7d8538df969

  • C:\Users\Admin\AppData\Roaming\Windows\System.exe

    Filesize

    183KB

    MD5

    7d17713fc862d6a8e99d21886724b326

    SHA1

    ecc9378bfe46d03d4c9cfe3ca5e064e93712644c

    SHA256

    d5feaa594c1402ac14cf911dbe520b2d5670b732d8203c3fd035d96483c605fa

    SHA512

    8953fec9e3d1248fd8fade518de35c17233ebbdab2f9d2b899203c54a92db76f9aef62a209342fbec00667179105ffbbcae00aee35020119609bceb451bcfef2

  • memory/3492-28-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-24-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-33-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-32-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-31-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-30-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-29-0x000000001E8F0000-0x000000001E952000-memory.dmp

    Filesize

    392KB

  • memory/3492-26-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-25-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3592-23-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3592-2-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3592-3-0x000000001BB30000-0x000000001BFFE000-memory.dmp

    Filesize

    4.8MB

  • memory/3592-9-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3592-0-0x00007FF9FEBA5000-0x00007FF9FEBA6000-memory.dmp

    Filesize

    4KB

  • memory/3592-1-0x000000001B560000-0x000000001B606000-memory.dmp

    Filesize

    664KB

  • memory/3592-8-0x000000001E480000-0x000000001E790000-memory.dmp

    Filesize

    3.1MB

  • memory/3592-7-0x000000001C340000-0x000000001C38C000-memory.dmp

    Filesize

    304KB

  • memory/3592-6-0x0000000000F20000-0x0000000000F28000-memory.dmp

    Filesize

    32KB

  • memory/3592-5-0x00007FF9FE8F0000-0x00007FF9FF291000-memory.dmp

    Filesize

    9.6MB

  • memory/3592-4-0x000000001C0A0000-0x000000001C13C000-memory.dmp

    Filesize

    624KB