Analysis

  • max time kernel
    261s
  • max time network
    289s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 22:50

General

  • Target

    d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe

  • Size

    1.7MB

  • MD5

    1959ce1e98b798963f8b7d04bfb71e69

  • SHA1

    3f2fb337ca2f2686e55b985e1f4020e2273bc5a8

  • SHA256

    d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870

  • SHA512

    8e736a00b4077d32e11c6ae100d4148033c5b6bdbb2a874f707c3315db5ac61798cc310198aac97f4c29ae04f45d34e0a2d45a57cb43bd5536e7f3199add3e8c

  • SSDEEP

    49152:eo2sTMKEpK0Y6d84LE1pM5bK0dRfBp8N6eopiaj7EvwtCpLdiXr9fpJ2M67:l2sTMKEpK0Y6dTE1pM5bK0dRfBp8N6eL

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1164
      • C:\Users\Admin\AppData\Local\Temp\d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe
        "C:\Users\Admin\AppData\Local\Temp\d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Command Command.bat & Command.bat & exit
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2912
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2260
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2612
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 627000
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3016
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "possiblebasicshtmlensure" Brisbane
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3040
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Pace + ..\Proved + ..\Accessing + ..\Reaches + ..\Compressed + ..\Po + ..\Itsa + ..\Major + ..\Shares + ..\Resolutions + ..\Write + ..\Hosting + ..\Hospital a
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3020
          • C:\Users\Admin\AppData\Local\Temp\627000\Legitimate.pif
            Legitimate.pif a
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2864
            • C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1416
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2636
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Colour" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Colour" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeInno360.url" & echo URL="C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeInno360.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3004
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {4E25D663-3501-4122-9152-BB95C0C3700B} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js"
        2⤵
          PID:3020
          • C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.scr
            "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.scr" "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\o"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js

        Filesize

        194B

        MD5

        1d41db49c62160fa6b7ae7017d0978c8

        SHA1

        d7aa8b6ae0b139d575a8d62addea8ba854f42eb4

        SHA256

        550e45cc04fc36cd37370a9df6f98bacca638c5a7b8ee93de08a3ab0fc2db59f

        SHA512

        e32ec978f42230652d421453423a9c1d8c7b7374db4511cb396f668256d6ffb5765dcba0e2e06e4bf344bb8336ac41815b712060ba549e579cba5811a20f10c1

      • C:\Users\Admin\AppData\Local\Temp\627000\Legitimate.pif

        Filesize

        872KB

        MD5

        18ce19b57f43ce0a5af149c96aecc685

        SHA1

        1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

        SHA256

        d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

        SHA512

        a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

      • C:\Users\Admin\AppData\Local\Temp\627000\a

        Filesize

        911KB

        MD5

        6297235a485d3448d2c41335eaffc550

        SHA1

        5f6c302a27c9a0a987d3fb2b9dc8c1ffcd3a1b42

        SHA256

        9fed9159a76f9671a9f2dcc3ea03a01e73e743d03b221057f499eb566edeb7ba

        SHA512

        40ce01e9f7274bc98b7e9a339b27dc49e585defb92475a54af480266f27c2fc04c956618fe27b5828d640f35e844b5d3bcaad1d6acbd185ad6ca1cb6588481d5

      • C:\Users\Admin\AppData\Local\Temp\Accessing

        Filesize

        92KB

        MD5

        0660597107fdecc6caa17c15478250ba

        SHA1

        b7d15f234dde86dedb70a5160ed926a7e3db36ff

        SHA256

        ec16ee65b59f694067f8630f37e9828a7c293ac5a4fc35b3e2613dc31d38f13e

        SHA512

        3e8c61a1903b38637ff5d50368244a005fd2582b59001126b945e759d3b9c501a3a7bcfd8075f11f4dc9aa6fb4676fa0153e143682034f9b4da4b46f109644ab

      • C:\Users\Admin\AppData\Local\Temp\Brisbane

        Filesize

        758B

        MD5

        d3ef49de39be08594781cedbe506879c

        SHA1

        1c4767ba9fae1286453ebaa99b1944bad7f7394f

        SHA256

        24ac168fad30c8981fb1a05b5519a5c062ab2b25616180b8609d31a754e92070

        SHA512

        bd3655433e524bfc8d9a3a92d569d5e1031baf45185933b96d209fadfbdcf5b469b6c56fcffda6afa56cc81c8304e33b5594b96d1c0fd085b43676a24dc3dcf3

      • C:\Users\Admin\AppData\Local\Temp\Cab59B6.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Command

        Filesize

        27KB

        MD5

        22af1c01d5011f1f0fb02abd46eec3d7

        SHA1

        004f5b13fb6071a31f78308c8ef1fd19d59731c2

        SHA256

        20da2c26bdf7adbbc3fcb887a7d6061c1e2834d589a24699a86b810b6edf83c4

        SHA512

        9ccfba21c24926648cbae40e9b7a01a45acf22161d417c772776119f23da93019cf419f9c2881592c4ae0b2705e0a13dee2715af65d9f7d91c18891b9433d56d

      • C:\Users\Admin\AppData\Local\Temp\Compressed

        Filesize

        77KB

        MD5

        c847a7c2004ff04522106f8865745b91

        SHA1

        05135f0531b7806dbd274ee91c9137a1e1089e49

        SHA256

        2a658a55624d7f653647ceeae7aad664c5c982371aba6ecc7bbf556fb9c9f16a

        SHA512

        5cc4135e3e7ddae0230df05d52a10e2745887fa20a9f80faf8467590aad152093b9e6bdaf43f99f46fb948900328a0b58f9985afdfc7802a06e1dbd419142a9c

      • C:\Users\Admin\AppData\Local\Temp\Developers

        Filesize

        871KB

        MD5

        9c841babc2fc25358efece82d2a83ed6

        SHA1

        49b18eb448738b94edeca06171c64848b6694555

        SHA256

        4732770184b8a59ff69720c1c0c16596c63c26a2a7367b64810a91d0f14f1f85

        SHA512

        f35fb5d51ec22b942414788a4ac906041feebc83873517591104ea68154fcea8678e90399a2ab0ef07cb8a06501b3586395c815e6d81150ed3a317f370f86fbf

      • C:\Users\Admin\AppData\Local\Temp\Hospital

        Filesize

        6KB

        MD5

        9b2c091f0b42ba119e5fa6bfd95e22d6

        SHA1

        38b7744c835a9d8856c38e19a06f1107249b5565

        SHA256

        e8301f7e0ff99dae0f724822ecefab61b4b21aeffc1c9c182bbb2b3d6f04e559

        SHA512

        cc14a3324acbf93deb6d670262d52f482ef91b071a312ab3d5ccc9ecd7f1772d7937a80f6092b64c300783108d18051b748934e5fa98b3b5ff15e1524708d6fa

      • C:\Users\Admin\AppData\Local\Temp\Hosting

        Filesize

        56KB

        MD5

        e7efd7a06af605e93ea0e0f6a768d7a9

        SHA1

        1ac31c4e79950111568d4ce73fcee387b865a415

        SHA256

        2eb51c59b8b67fcb580465afebdb7617a83266d8cd0bddd299c1f2a8c8550ed4

        SHA512

        42b2bae0a461a623e41daee3becba768802e879b36b438f4c31b0fb3d7654d0d953e5edfbc7b56fb61b1620a5fad606f002d8188ed6360b4709f859618700e2c

      • C:\Users\Admin\AppData\Local\Temp\Itsa

        Filesize

        94KB

        MD5

        051a14f480a1e08f6aea9bcb691d5e50

        SHA1

        808a2f6925953c3fe9c9c4d76596c958ebdbb6c8

        SHA256

        938ffc79927fb9634d508bd78ca49b5b45b733f7912034e0e2cef287ec3d3f91

        SHA512

        60476a137ac2c6bd7f3d130be063ff498b965e23f4cf497af64c048f14cf3d199fb997923c92e8a7b5a0516f65fc0e64c5ac149b092068fbdbf45983825ef028

      • C:\Users\Admin\AppData\Local\Temp\Major

        Filesize

        50KB

        MD5

        5cc9b184c9b717f867107896b1e1031b

        SHA1

        42896a978e3d0e31fba322fc4ea6739a1e45d7c7

        SHA256

        b1df5573ec0b1270a3907b03451a621b697df2cc059f488394fd212db4e8f302

        SHA512

        8a669c0af35695996db742d928ce7ed6496fbcd7a69301a550300504fad2f9aff63025e777d18ebc65ad5ca59e045b60e6c4fc6b47170482096137f9b4790004

      • C:\Users\Admin\AppData\Local\Temp\Pace

        Filesize

        62KB

        MD5

        0aa998ebfad36eb40ee5c8f673fdbaa8

        SHA1

        d5ce174dff8ae5a0ec25d9ace0e9ff5c7284990c

        SHA256

        2b2a31aafd7647c11bbe50fe3c23d9be3412639ddec00764764eb3f34b63cb8e

        SHA512

        1d460eb5500a82e0fd65e8e6eaaaafd73c3e86e0663ea93204fe8b6e8d84e4e998a6865683b52efea4339dbbb72d726971765835bed295a6c4efb8df7e1db29d

      • C:\Users\Admin\AppData\Local\Temp\Po

        Filesize

        93KB

        MD5

        02aee454c53ae3c3d86649c2bd57c944

        SHA1

        68a4ca87ca6429393ea4514958c799043c0f949a

        SHA256

        69bb3d3305f02fc996e13b741efea86d0f9b3f55789d9adcefd289cb52bb8d1a

        SHA512

        1ba108d5c9aea52c1647cbc33e75957455b235df4f871d7f3557f128827ad73bce54905b3a79ad0fc97367281bf4d42c7a8319dfa49744411c6b3759d11b5a65

      • C:\Users\Admin\AppData\Local\Temp\Proved

        Filesize

        50KB

        MD5

        ad1f2663aa0d3ff8a364cd9191875d6d

        SHA1

        be0bf7f7dada4ea98fdb1c79fddf85b41e09b8c9

        SHA256

        e6bfd3f87f7e209f00ab50107971872b5e10de6a8b0b2b71f49445460252f2ac

        SHA512

        0d5a57287a16f34d9559bdc8a4e005c1432ac73918efb5ff32f8ec960f00549764ee63e0a5b62112787e01efba05e6f125c1336998cf5df8372e3d157919011c

      • C:\Users\Admin\AppData\Local\Temp\Reaches

        Filesize

        76KB

        MD5

        443509b8ebc7249e01552436f8d7fb2c

        SHA1

        12890b0ca0b1cec196075ba820f88a7cb75250b2

        SHA256

        ec09b4bf30a7061383164afcc2c4aa41723e2f1644637e75736501046dad7248

        SHA512

        448e81cb11ac47f9b5b3589c7c392540b1591fa3209a80e1e1eac8027efebe250b9904ae43678b63ce7d2f2e68b4702a971b7cd8dfcc96813c7ff4cfdfe1bdc7

      • C:\Users\Admin\AppData\Local\Temp\Resolutions

        Filesize

        86KB

        MD5

        2af79301bb06ffb2a9b172002fa10322

        SHA1

        7f8f6d93a596d52b268ff485c1cdbbc8c11716ca

        SHA256

        6d60f1e883b792ea433a38563d081360067bd1c224a30dbe33751fc2a57bc68b

        SHA512

        0918afda33d5c1081e263f8a1d1da53d525f189533414adbd32749b2aad91ec4d6b134ee3574a1d20adfd93d05a2ac2dbb3c3ab21a5fb7729e5c44bc4bed0a9f

      • C:\Users\Admin\AppData\Local\Temp\Shares

        Filesize

        71KB

        MD5

        817c1e7ad55bc045b23a7fb2a61aa33d

        SHA1

        bb7a5bc2f6ad5aa3db6e7800c31e5556b3f419eb

        SHA256

        a053fd49caea2142a9a7b6a49f84e0a8a999b828fb4283d3065ac6e73823ec99

        SHA512

        97e559a2a118758688e0c228eeb598f6a57c6b75e7688c43f0c534daae18cec9fdff036651b3babcf169c4ba74cdaca7052b125d2e480fbd471e83fa80ba57ca

      • C:\Users\Admin\AppData\Local\Temp\Write

        Filesize

        98KB

        MD5

        ab810c64c650a6c031bfe9fdf2b9cc2e

        SHA1

        b25e8ff044ba006f9a448198abd52bf9d18c97d9

        SHA256

        f6c3ee3cc5c783a7ea177a3e6fd40fe80cba6fe0bebc648c10d17b6cde369129

        SHA512

        fbec8add7b367ed488f8a7727fa5099899bcbb1a15010a1517005de2ebf483ac9079b54a707a06bae91068f506917e6751ce27df21f191c56b7693db28708b6f

      • \Users\Admin\AppData\Local\Temp\627000\RegAsm.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • memory/1416-51-0x00000000000D0000-0x000000000012C000-memory.dmp

        Filesize

        368KB

      • memory/1416-54-0x00000000000D0000-0x000000000012C000-memory.dmp

        Filesize

        368KB

      • memory/1416-53-0x00000000000D0000-0x000000000012C000-memory.dmp

        Filesize

        368KB

      • memory/1416-57-0x0000000000EF0000-0x0000000000FAA000-memory.dmp

        Filesize

        744KB