Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d2179c32e1d00f92ad9b741639a48ab0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2179c32e1d00f92ad9b741639a48ab0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d2179c32e1d00f92ad9b741639a48ab0N.exe
-
Size
1004KB
-
MD5
d2179c32e1d00f92ad9b741639a48ab0
-
SHA1
1a1e7e4ac740eac96ab49005d889ecbf77968ed0
-
SHA256
65a97c4b278cd1d973f51446bbba99db03628672cc070a4774a7037e8e1e4d28
-
SHA512
53615fe4dbb50ca37212e8dd1b7087fb2914a0a034dfbbb1f8894d8c0c80990ccb53a2c0f1b8c53ed893017aebfda981532f84a5752f3ad8b88b40e92caab2e8
-
SSDEEP
12288:NKE6zhdvk77mVTfHdQrkmSixJvxCKaI4/eiJUIVjrirGWy8Gc7MKgbg0DysOXlfF:mRWx6eKtL0ZJ3I5r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1380 XrT.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4564 set thread context of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2179c32e1d00f92ad9b741639a48ab0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 4564 wrote to memory of 936 4564 d2179c32e1d00f92ad9b741639a48ab0N.exe 85 PID 936 wrote to memory of 1380 936 vbc.exe 87 PID 936 wrote to memory of 1380 936 vbc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2179c32e1d00f92ad9b741639a48ab0N.exe"C:\Users\Admin\AppData\Local\Temp\d2179c32e1d00f92ad9b741639a48ab0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Roaming\XrT.exe"C:\Users\Admin\AppData\Roaming\XrT.exe"3⤵
- Executes dropped EXE
PID:1380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5cf97bf5424f1bdd50c372fc02e8c8b32
SHA14583a32b8329a382c7fa4ff183eb9433af86720c
SHA2567d4ed67e6745d721079497e28a6fab2d3ed1d0d49966fbcf1493beb3e3814c19
SHA512e572718f9fb4828b8e8f6ca8d1b5a8cf6f2dced40b23d56da9b5bc2b197a497cf306aff4f20726e8141e88071cdf5e6306be4465bc86dbb13361da39aede8f25