Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 06:08
Behavioral task
behavioral1
Sample
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe
Resource
win7-20240708-en
General
-
Target
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe
-
Size
628KB
-
MD5
63f7700b734870677bab134f6ce546d6
-
SHA1
fb23557342a625eefcb22df2f55de5096c39778b
-
SHA256
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e
-
SHA512
472ec672424721a8d9ebefd99e9831d338233666f6a34993cef2629b75f1286325982e8c94d7d0f52ae95350c3e22826f7d47fb8527bb31149a868cdbf9003cb
-
SSDEEP
12288:BDdrwpnYQ0i7gl2OkJW71KOmht8SCfZ//tyBIAEG+/Qj3TXXjxhSk3byh/i5Zkd:B5WYQjojLiqSyZkIBPQj3TXzDHrQiKd
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3316-0-0x0000000000400000-0x000000000059F000-memory.dmp upx behavioral2/memory/3316-7-0x0000000000400000-0x000000000059F000-memory.dmp upx behavioral2/memory/3316-54-0x0000000000400000-0x000000000059F000-memory.dmp upx behavioral2/memory/3316-57-0x0000000000400000-0x000000000059F000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exedescription ioc process File opened for modification \??\PhysicalDrive0 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "33" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "33" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\Total = "55" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.msn.com d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.msn.com\ = "33" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "55" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\DOMStorage\msn.com d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\NumberOfSubdomains = "1" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.msn.com\ = "55" d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exepid process 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exedescription pid process Token: 33 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe Token: SeIncBasePriorityPrivilege 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exepid process 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe 3316 d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe"C:\Users\Admin\AppData\Local\Temp\d39c30c18e6023bde25b7b5f58f8e6363a90db3b0b98304fcc3579490f75a72e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3316