Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
585f572baa3c0985a1a402f91842d530N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
585f572baa3c0985a1a402f91842d530N.exe
Resource
win10v2004-20240802-en
General
-
Target
585f572baa3c0985a1a402f91842d530N.exe
-
Size
285KB
-
MD5
585f572baa3c0985a1a402f91842d530
-
SHA1
118180399cd532ad5e76716cff6328e8147a9644
-
SHA256
a0d9e18592211c81c330f2cf4e68c5b85eae3229b5b3403898ad7fff2712c73d
-
SHA512
2dbdae3eb56f393775b12b8ad18ab2043924960c11155d0fec37da07513cac75b21b88613eae85a0fdafcbfa169803e4405c8fe9bfe43e7b46e54229edcb2c21
-
SSDEEP
6144:X0MBfldoBcoScmqvpyP6yMzhNwxMUQQgxiT7lg2MFw0d7k0KumDD7tRyj6:XrBYBxEqvpU6ywhN4hg8T7qFwK7k7f7r
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 585f572baa3c0985a1a402f91842d530N.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2340 71A7.tmp -
Loads dropped DLL 2 IoCs
pid Process 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2848-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2848-11-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1496-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2848-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1496-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2848-112-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1736-115-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2848-306-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2848-310-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C96.exe = "C:\\Program Files (x86)\\LP\\F88D\\C96.exe" 585f572baa3c0985a1a402f91842d530N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\F88D\C96.exe 585f572baa3c0985a1a402f91842d530N.exe File opened for modification C:\Program Files (x86)\LP\F88D\71A7.tmp 585f572baa3c0985a1a402f91842d530N.exe File created C:\Program Files (x86)\LP\F88D\C96.exe 585f572baa3c0985a1a402f91842d530N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 585f572baa3c0985a1a402f91842d530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 585f572baa3c0985a1a402f91842d530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 585f572baa3c0985a1a402f91842d530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71A7.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe 2848 585f572baa3c0985a1a402f91842d530N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1820 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2800 msiexec.exe Token: SeTakeOwnershipPrivilege 2800 msiexec.exe Token: SeSecurityPrivilege 2800 msiexec.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe Token: SeShutdownPrivilege 1820 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1496 2848 585f572baa3c0985a1a402f91842d530N.exe 32 PID 2848 wrote to memory of 1496 2848 585f572baa3c0985a1a402f91842d530N.exe 32 PID 2848 wrote to memory of 1496 2848 585f572baa3c0985a1a402f91842d530N.exe 32 PID 2848 wrote to memory of 1496 2848 585f572baa3c0985a1a402f91842d530N.exe 32 PID 2848 wrote to memory of 1736 2848 585f572baa3c0985a1a402f91842d530N.exe 34 PID 2848 wrote to memory of 1736 2848 585f572baa3c0985a1a402f91842d530N.exe 34 PID 2848 wrote to memory of 1736 2848 585f572baa3c0985a1a402f91842d530N.exe 34 PID 2848 wrote to memory of 1736 2848 585f572baa3c0985a1a402f91842d530N.exe 34 PID 2848 wrote to memory of 2340 2848 585f572baa3c0985a1a402f91842d530N.exe 37 PID 2848 wrote to memory of 2340 2848 585f572baa3c0985a1a402f91842d530N.exe 37 PID 2848 wrote to memory of 2340 2848 585f572baa3c0985a1a402f91842d530N.exe 37 PID 2848 wrote to memory of 2340 2848 585f572baa3c0985a1a402f91842d530N.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 585f572baa3c0985a1a402f91842d530N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 585f572baa3c0985a1a402f91842d530N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exe"C:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exeC:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exe startC:\Users\Admin\AppData\Roaming\D05AF\0EEF8.exe%C:\Users\Admin\AppData\Roaming\D05AF2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exeC:\Users\Admin\AppData\Local\Temp\585f572baa3c0985a1a402f91842d530N.exe startC:\Program Files (x86)\AF8A2\lvvm.exe%C:\Program Files (x86)\AF8A22⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Program Files (x86)\LP\F88D\71A7.tmp"C:\Program Files (x86)\LP\F88D\71A7.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD59a057ef8d48f4cecdd265452324e18da
SHA18f9a2d8d2ff77eaae9dced25bda7ae339aacf1d7
SHA256ab116867a493dab1c627e2ff8305028c7b39e41ee7914272400303c7a78fc091
SHA512499a0c725832fb78c0bc8f0e335d565828e591042cf3263519410e455a34ccad8d28f4b1980caef94f4a56ed718f963e0bc9d370ad9ef181686992a1e1d6dd95
-
Filesize
600B
MD576c5f0951ded6ee93f175afdc9251732
SHA1889074ab488f3f6cf2c7be86a81dd35c3f6a643b
SHA2567203a439e087259de1819ee1698a031b9124e51a9c665d5961f71efc058e7a48
SHA512ec462d62ada9e61bab11abc90f3cd2fbcae1d81c86b3e2b2472d6be468a0847cbabfc981490590b5a66e73492687827e36352c865661549137c0f71f470dd558
-
Filesize
1KB
MD57d56a0aac25442e1f39e5f0079c0a0b1
SHA119526f00fdaceb6eff6bd49d7871df4bc398eb47
SHA2566593a03004f25a5c05dfd00bc2d605310d117dde86a7b45ff09c0cf400276599
SHA5125421e88a07ef62280bf91b4ce3413c934cfe5257ffb09c283e84b7336913dcfd5c85eebe8b4760d4d7de68918f231408c03a0b20ab0f7040db110e6100ceb049
-
Filesize
100KB
MD550777c38a35804872660aa71c7eb52d2
SHA1c94bdd4378d0e9f0bb2a71edca520bd49251a7aa
SHA25644761b2153a01f2cd930d6b87fc3e2ba09e8940e4d096b556e99c74f26938faa
SHA5120beaa0e126af6adab4867e40fbfe554b829a769bd22af5aad1cfe5f63d569c16c2a003d7b98724efdf8fe255b6c8b124487c999db70c2012ba68faa130fa9ce4