Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe
Resource
win7-20240704-en
General
-
Target
f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe
-
Size
916KB
-
MD5
48936a82b076a2375403bc368b184b7e
-
SHA1
e34bb269bdd1fef573fa0cf18f28d7019e52d850
-
SHA256
f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6
-
SHA512
fbf058e48c4baba3e2f978ad7d1ee6042ec915ffc97fce11e4b9a95d4583a97adfe8a0f0aad36999c4e1364b1694da766da6d2ad3c08f64dbd87c18d74adf89e
-
SSDEEP
12288:YD/xbfqFZQriJWicJY7Ci8rwh6neOmrB1XB4nj9t8nC:YDxfqjQGJ/cG7n8roQj9mn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3364 73vroEhl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3364-10-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/memory/3364-11-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/memory/3364-24-0x0000000010000000-0x0000000010018000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73vroEhl.exe -
Kills process with taskkill 1 IoCs
pid Process 2888 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\MUICACHE f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe 3364 73vroEhl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 3364 73vroEhl.exe 3364 73vroEhl.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3364 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 94 PID 3584 wrote to memory of 3364 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 94 PID 3584 wrote to memory of 3364 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 94 PID 3584 wrote to memory of 4160 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 95 PID 3584 wrote to memory of 4160 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 95 PID 3584 wrote to memory of 4160 3584 f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe 95 PID 4160 wrote to memory of 2888 4160 cmd.exe 97 PID 4160 wrote to memory of 2888 4160 cmd.exe 97 PID 4160 wrote to memory of 2888 4160 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe"C:\Users\Admin\AppData\Local\Temp\f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\73vroEhl.exeC:\Users\Admin\AppData\Local\Temp\73vroEhl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\kill.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM "f71a21939443fb450a22361c0d1029aadcd5ed011a062e67cdef0dc9dd393ff6.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54243ec7dba30e0e6b9d655bb147c0581
SHA1bc7fa6e71779716e4d7eaa9dffbb2680635b36af
SHA2565bbffd1acdba3b07eaaecc741912c7dacfdbd957dd473b5f9e35a71b13f9339b
SHA512ba1ca1b5c02524f073099a3604825bc509d9c0cd8caa2c1da3f936662e8a5b27a120e46de6a97404e361fc3fcce0066db8f7c44629c921d2f1ad49c9ded940a1
-
Filesize
486B
MD5ce798cf5ab9343a9a79cb802c573ae03
SHA108421315829593024e7d03038c4490a6188e72dd
SHA256a928f87d44f168ce01f6bbee8f07bff8ffa2cfdbeeabdd65c23ccc91eb3f4f5b
SHA5120ba56d63472106a395e1e5e05c9a4cf2ae3517b5d2c9899e75d4277cb4fd73f938bb33da181900943a359375b58cae9255b63e90a8213daa248eaf2290d8a737