Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
caaa2cf133115f9613c218e25733b870N.exe
Resource
win7-20240903-en
General
-
Target
caaa2cf133115f9613c218e25733b870N.exe
-
Size
92KB
-
MD5
caaa2cf133115f9613c218e25733b870
-
SHA1
bdb80f9a4920407599f246687164fbf0a7e73bf5
-
SHA256
7b7e6f20dd1933c8ef8e122a3ce5cf6159bf923a08995af8ca08be420983c73d
-
SHA512
993b0be420753d1871d1f8cf8a1c26bfdc50a77df15cd777fe7d6c87ce0f055bbb28293627803bb4ab450d00d66c47f8651f48161b49d2b13c4be2610a8a411a
-
SSDEEP
1536:pzGWObbrGNQwNmyREVuXBYWBNohFQXJAKYzDH7MS38lL9IB8m8s1PeMj6rS/7P:tfO/kQ2DEVsBRAKMDHAS3Y9UBH
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caaa2cf133115f9613c218e25733b870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2288 1724 caaa2cf133115f9613c218e25733b870N.exe 31 PID 1724 wrote to memory of 2288 1724 caaa2cf133115f9613c218e25733b870N.exe 31 PID 1724 wrote to memory of 2288 1724 caaa2cf133115f9613c218e25733b870N.exe 31 PID 1724 wrote to memory of 2288 1724 caaa2cf133115f9613c218e25733b870N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\caaa2cf133115f9613c218e25733b870N.exe"C:\Users\Admin\AppData\Local\Temp\caaa2cf133115f9613c218e25733b870N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ytk.bat" "C:\Users\Admin\AppData\Local\Temp\caaa2cf133115f9613c218e25733b870N.exe" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5e6b031b9b7d40fa332ebc6f38b2f9f64
SHA1d6dbffcfcc6a26188fd8d2e5b6257af4821fb48f
SHA25666a04ff993916bce61351e4c3b94ea079c806efb1723c7cd79bd32aaf6847e0b
SHA5127d17655334fcda4c3326110d340fd91cd23ee284dec99c3a8bbc8408342fda5f51e27aaba75fba4cccd513c342c22f07ad2cf6e2326ba575e3cc0eba4ea91948