Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe
Resource
win10v2004-20240802-en
General
-
Target
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe
-
Size
501KB
-
MD5
6b34408cb796d4e16a6caa577ebce6b9
-
SHA1
f011ab355ac5a00204c033f3ac73848f6ce4c0ee
-
SHA256
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a
-
SHA512
344defa68966df547a0504ee221a2037f737d469e0c496009209f9334589f0f73ac69226bb74ea60eb116332ccaefa0d5c1f8972a5b9d34628d9bfcc4147ea84
-
SSDEEP
12288:E2iNErX80k+laBnUISbE0u9QgYZoXONvIGc2:E1ij8v+MKjbE0ul+Nx
Malware Config
Extracted
xworm
5.0
91.92.120.13:7099
ZCamGCh7lBqmpyCR
-
install_file
USB.exe
Extracted
redline
FOZZ
91.92.120.13:1912
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.hostinger.com - Port:
587 - Username:
[email protected] - Password:
Emrqtr@2024info - Email To:
[email protected]
Signatures
-
Detect Xworm Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2852-30-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2852-29-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2852-26-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2852-24-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2852-32-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2852-34-0x0000000000660000-0x00000000006B2000-memory.dmp family_redline -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2852-36-0x00000000075D0000-0x00000000076F0000-memory.dmp family_stormkitty -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2800 powershell.exe 2452 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exedescription pid process target process PID 1196 set thread context of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exe39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exepowershell.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exepowershell.exepowershell.exe39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exepid process 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 2800 powershell.exe 2452 powershell.exe 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exepowershell.exepowershell.exe39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exedescription pid process Token: SeDebugPrivilege 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exepid process 2852 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exedescription pid process target process PID 1196 wrote to memory of 2452 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2452 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2452 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2452 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2800 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2800 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2800 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2800 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe powershell.exe PID 1196 wrote to memory of 2812 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe schtasks.exe PID 1196 wrote to memory of 2812 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe schtasks.exe PID 1196 wrote to memory of 2812 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe schtasks.exe PID 1196 wrote to memory of 2812 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe schtasks.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe PID 1196 wrote to memory of 2852 1196 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe 39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe"C:\Users\Admin\AppData\Local\Temp\39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DTEmeRxUBaLqyA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DTEmeRxUBaLqyA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD3E2.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe"C:\Users\Admin\AppData\Local\Temp\39962cdef1efccb262b01e3bc41e4380ed1f925885f1a22178e505f5c440887a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548ed0d50211285397e3806a3250f2acb
SHA19c124e30509474408694e28dbf88a3538d01b7b6
SHA256751926effe8a028016d41afe0fd533533b2f08794fe3bdd2299b1cd4164eba25
SHA512b6b03a5238471329cc830551bf45f304eeec9ec3fb24708a1e3ba7aa49cab64fbc8a17569677961cb48b7b82f49c17508c1b18acde6bf11418ad7788e6dfc762
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DCANN45EUG634W9BH1XA.temp
Filesize7KB
MD51efddbbc180fcbdc21deea79cd67ade7
SHA1ddc61bdca6c52d32458e50f47936ec5773dddf14
SHA256bf3742f517c8ad27e6a1f719fdfdd78b562762138d7b378873ddd1812fb6e57a
SHA5121294f043ecccae33a9951d449d71180e45d262d8ab0d5d8c8613d0a97a8d4e018bbce1894ca2c3851aa5c51b07e2a4fffb2c3ea7fc2999bdc9897fe057cfecce