Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d2179c32e1d00f92ad9b741639a48ab0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2179c32e1d00f92ad9b741639a48ab0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d2179c32e1d00f92ad9b741639a48ab0N.exe
-
Size
1004KB
-
MD5
d2179c32e1d00f92ad9b741639a48ab0
-
SHA1
1a1e7e4ac740eac96ab49005d889ecbf77968ed0
-
SHA256
65a97c4b278cd1d973f51446bbba99db03628672cc070a4774a7037e8e1e4d28
-
SHA512
53615fe4dbb50ca37212e8dd1b7087fb2914a0a034dfbbb1f8894d8c0c80990ccb53a2c0f1b8c53ed893017aebfda981532f84a5752f3ad8b88b40e92caab2e8
-
SSDEEP
12288:NKE6zhdvk77mVTfHdQrkmSixJvxCKaI4/eiJUIVjrirGWy8Gc7MKgbg0DysOXlfF:mRWx6eKtL0ZJ3I5r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 XrT.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 vbc.exe 2376 vbc.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2179c32e1d00f92ad9b741639a48ab0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2692 wrote to memory of 2376 2692 d2179c32e1d00f92ad9b741639a48ab0N.exe 30 PID 2376 wrote to memory of 2472 2376 vbc.exe 31 PID 2376 wrote to memory of 2472 2376 vbc.exe 31 PID 2376 wrote to memory of 2472 2376 vbc.exe 31 PID 2376 wrote to memory of 2472 2376 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2179c32e1d00f92ad9b741639a48ab0N.exe"C:\Users\Admin\AppData\Local\Temp\d2179c32e1d00f92ad9b741639a48ab0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\XrT.exe"C:\Users\Admin\AppData\Roaming\XrT.exe"3⤵
- Executes dropped EXE
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5cf97bf5424f1bdd50c372fc02e8c8b32
SHA14583a32b8329a382c7fa4ff183eb9433af86720c
SHA2567d4ed67e6745d721079497e28a6fab2d3ed1d0d49966fbcf1493beb3e3814c19
SHA512e572718f9fb4828b8e8f6ca8d1b5a8cf6f2dced40b23d56da9b5bc2b197a497cf306aff4f20726e8141e88071cdf5e6306be4465bc86dbb13361da39aede8f25