Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
300d0136fcb3bfe40cb66208c8b7cb90N.exe
Resource
win7-20240729-en
General
-
Target
300d0136fcb3bfe40cb66208c8b7cb90N.exe
-
Size
2.5MB
-
MD5
300d0136fcb3bfe40cb66208c8b7cb90
-
SHA1
2cab41a03ef4d9023f8e28960121712a54ec9092
-
SHA256
23d464ec4ee0d0425b17e39377d980bc2c239422eeb74ca302d02321bb083e4e
-
SHA512
d9337933d296ed5d0915156c49f0c8078f4eafda926cf52d91a9a3cb0ce4ec28247f65d2219e5635b3a41b2d0c8a32866f5a88e4940f331c72198489af3827c3
-
SSDEEP
24576:exWb1aUqkstEpYIXNiW72WOfaedDrGnrdEROGHOhWkQJCtHYX63C/hRJHOhkCMY:exGaU6kOFdDqnroHONQhK2HOX/
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 300d0136fcb3bfe40cb66208c8b7cb90N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\U: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\Z: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\P: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\Q: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\R: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\A: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\E: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\J: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\K: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\T: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\V: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\W: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\H: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\L: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\N: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\O: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\X: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\Y: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\B: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\G: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\I: 300d0136fcb3bfe40cb66208c8b7cb90N.exe File opened (read-only) \??\M: 300d0136fcb3bfe40cb66208c8b7cb90N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 300d0136fcb3bfe40cb66208c8b7cb90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 300d0136fcb3bfe40cb66208c8b7cb90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB4C8181-701F-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432208627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1724 300d0136fcb3bfe40cb66208c8b7cb90N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1724 2684 300d0136fcb3bfe40cb66208c8b7cb90N.exe 31 PID 2684 wrote to memory of 1724 2684 300d0136fcb3bfe40cb66208c8b7cb90N.exe 31 PID 2684 wrote to memory of 1724 2684 300d0136fcb3bfe40cb66208c8b7cb90N.exe 31 PID 2684 wrote to memory of 1724 2684 300d0136fcb3bfe40cb66208c8b7cb90N.exe 31 PID 1724 wrote to memory of 2800 1724 300d0136fcb3bfe40cb66208c8b7cb90N.exe 32 PID 1724 wrote to memory of 2800 1724 300d0136fcb3bfe40cb66208c8b7cb90N.exe 32 PID 1724 wrote to memory of 2800 1724 300d0136fcb3bfe40cb66208c8b7cb90N.exe 32 PID 1724 wrote to memory of 2800 1724 300d0136fcb3bfe40cb66208c8b7cb90N.exe 32 PID 2800 wrote to memory of 2752 2800 iexplore.exe 33 PID 2800 wrote to memory of 2752 2800 iexplore.exe 33 PID 2800 wrote to memory of 2752 2800 iexplore.exe 33 PID 2800 wrote to memory of 2752 2800 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe"C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe"C:\Users\Admin\AppData\Local\Temp\300d0136fcb3bfe40cb66208c8b7cb90N.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.35my.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD534557a8a8c670a9e683c404235558159
SHA1945f4bd1a7803dff97d5028d6e43f0edb8cd5b6f
SHA2563780d38f8ffe4b54f6fdf71029135c81321c523c89548acf3161a199c4d66193
SHA51245d1aff1d02ebfd3e76c418d8680397a88e22ca3b1548430875f2c2c78270acacc471ffb0515235480d484c2677c809e8b30f7ba0c6d24283a8e25a166890e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b550e93f76cb8aec725e0ab1b69efe8
SHA1c7c1bcb4fdfb206ca3a91d2547315e878c2ebcc1
SHA2569721e164b198e8688ea8cfac45555c90f65cbb4634e25003225af18ed0e18f21
SHA512bcc8319da59390cc687842588161ff0cea3feda626597b12d0f80c1c5a306b35f9f3fb0d83987666bdbfd9066258abe387d4e89f53c4cc2b21f241431973efbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3529063de6a4107c3ad86b2274641f
SHA137350a675bec26a0d1974c60b33ea90933036dab
SHA256f62827109e9384f69e519610ddd93325d11a6921ad554552645208af022b104a
SHA512ded99aa1dcdf1a185da462311afe098e06bebadcb74285a1a6246354cf6180f34545ea7731d6a72157ade6997a6ff8c15ad2ed78d85790117e7025ee424a15b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958421e6c8d975ca862af043608c140d
SHA19150419ef7dedeb23804719eb8bd4d3699a9bf75
SHA256942b5aba058df32142db26a15b479ef5c063c9634166df7e82063e9c2580c95d
SHA5128441aea4dc621de6dbc1d8eb7aacca66945cda1fd31a6d75831b0c472cc903fb12bb76450e554304f8149615c6e5191909f6b541aaaa7e9262bf5c302b7eab58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e707a6304c27702b3a7fa8d67a8713cb
SHA1ed8eaac81867930b3e142f40018808f36ba9375d
SHA25615590a501915ff755cec538f64d1da141b330919db226634260114ecfe28dbe3
SHA512174f3ffecfd27245668ea00de1fe836178a17049a452ad2e381f321d9b9a2a54c2edfae5bb3144c4d23574748311dd611139f43c7ea054c1da91ff039b0bc63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c99d1a7ddd0bbcb74fc9c56086bdb7
SHA1dbb5e2a75d4ca8d7d01d1ff594b2dc205a593ad6
SHA2564786ddbbdb8a617baf6284bdb62c1506b5d999282939e71ae778ec93d91aa243
SHA512c51977b3b924fe6d1c9c62666866deff240974303f6d911b81a23fa75d3c9cce14fc54af6915f1a84bf4bd14e20fc7731eff4c8afb3ba13026e177b181ebe301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545cbb27ea00b1d5cf56839828614d0b4
SHA1fd01bba70640f9c4c3b2503b5ca4016ed60ed1f1
SHA256e7fe88418146bc9948619bd1040e977562e3464e355a0bde834d7518db378bb4
SHA51293696aaf93bd0087fedf1941b9d557aa104821f6fd12cd497aca8f5fd55517b6b2479fad430214ae97795021e83e995c6a8bb897d952bc970cda6308fc2cf9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438616d36b1a17a67ba2e98da2cc54c8
SHA13f07fade4fedc21ebfbe1a33ae8b0928893e9388
SHA25625f2ce1595089cd716b160f50e110c2df1ca01487132f14172adaf7169506cd4
SHA5127bd2c3e0f1416b039633bc8e7ea8c3b1a8cd2fb2c1f7ee92e37feef02127d4a6a57fd860c9ad38752bfc93f2027c22e9362a097c31d940db9b35b3780fd66b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544051675e1ea50837c3e0f21a4ed8ba5
SHA1eff8e3a80b45f157b6b18d3d54e0b1c800b5462b
SHA2561810d40e390cb2f53a2dd4b6d38b1500cd591e3021178754b083849b57607b62
SHA51296bbd31f1380c2aed2e943d016ed11c431da2566f1387f6a0a08022af361e83d24a3e80af8dc4c7e187c533f21ff7e2cebc4e9fd8cff814ba2868829893fde25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e8955bc11a29904510c053ec80dff9
SHA1bc599c269b6d93b9f4f9e68c6769d100df18bbcb
SHA256b092f3f05a4d14bd5cf61c81ba1b00ac448a6901986475c786312e4275edda81
SHA51251c93f64d493bee52f72af8e3f967f25373bafdf01a3899f8ff24f70a1493882f8d520aaf3e1f5f28d2b1684fa1076f1c3819c3f61fce85c2da8ed497f7167e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fd3ec941e433a951faa3dc8c7e9df5
SHA1f17073a4b804c521c18a9e0043d4404d62b5d20e
SHA256b62f6b4373c3d2e88b73301203ab6711fa596dee9a180e85f43f54d747b8438d
SHA5124011e9662168be3ada0ebb3db38862ffd93a96515226c6d4cc2125007d1a0c24ae0e28ca66950ab0bd51f6dfd9c40649ec0a5b54e61724a09d644850be648282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a965c452586734ae57cc1fb28b854130
SHA175f0fde960d74e14baf15fc67d6fe72e987fbd19
SHA256b052698d9ce28dedbd17c8ed25646d66cdb06fa2b9aff6a61e956ade34e9368a
SHA51213f5aa391496ff1da162f6453d33b58d4dc50e0c4c22de20a417a339cde97f908f384c9f37e36b34262b559f05d0e475d83a5b6c73eebfb6e812a62b9a44219e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f050c0bb6b768f35e06287abf4ba06f3
SHA14e7b2488c96428b336f4ae2e25736db811e3a564
SHA256b3f3ed40e782134799ec84eae35c37f9cfb081827e7409b2eae4552ecd1c21b2
SHA5123ab5eac818a4263923b603ca87fe66b6260ebeeb238cf3340c3070ad864bc014f62c229b3dc2269113255163c014bcdb4d250b48e1b4512d4af9e07eb22244f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b