Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
d6e193c96c9e8d77ad38fe3b20d73920N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e193c96c9e8d77ad38fe3b20d73920N.exe
Resource
win10v2004-20240910-en
General
-
Target
d6e193c96c9e8d77ad38fe3b20d73920N.exe
-
Size
276KB
-
MD5
d6e193c96c9e8d77ad38fe3b20d73920
-
SHA1
6bfd893e7463d0c1d82dfb79dc108c1dc97198e8
-
SHA256
b9a135c27baa2dba8e4d47eadd7d3cd37f2c1a382f885cc203e11fef5e36f609
-
SHA512
902590245b78368af3ab9469fff81558783ad874a76d20195c0a459e9e0f2f5e4421ec4c7981600208c40adcca37f5cb2cfbea4eea94d7a131929c544452d2df
-
SSDEEP
6144:HMJzxIugSAcaWs2qIDzzMdBntRg7y6FGVO/:1cq2qID3MdvCmg
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2972 2617.tmp -
Loads dropped DLL 2 IoCs
pid Process 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1864-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2736-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1864-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1864-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2200-80-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2200-82-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1864-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1864-193-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1864-196-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\619.exe = "C:\\Program Files (x86)\\LP\\2C0A\\619.exe" d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\2C0A\619.exe d6e193c96c9e8d77ad38fe3b20d73920N.exe File opened for modification C:\Program Files (x86)\LP\2C0A\2617.tmp d6e193c96c9e8d77ad38fe3b20d73920N.exe File opened for modification C:\Program Files (x86)\LP\2C0A\619.exe d6e193c96c9e8d77ad38fe3b20d73920N.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e193c96c9e8d77ad38fe3b20d73920N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e193c96c9e8d77ad38fe3b20d73920N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2617.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2256 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2328 msiexec.exe Token: SeTakeOwnershipPrivilege 2328 msiexec.exe Token: SeSecurityPrivilege 2328 msiexec.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe Token: SeShutdownPrivilege 2256 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe 2256 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2736 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 31 PID 1864 wrote to memory of 2736 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 31 PID 1864 wrote to memory of 2736 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 31 PID 1864 wrote to memory of 2736 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 31 PID 1864 wrote to memory of 2200 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 34 PID 1864 wrote to memory of 2200 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 34 PID 1864 wrote to memory of 2200 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 34 PID 1864 wrote to memory of 2200 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 34 PID 1864 wrote to memory of 2972 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 36 PID 1864 wrote to memory of 2972 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 36 PID 1864 wrote to memory of 2972 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 36 PID 1864 wrote to memory of 2972 1864 d6e193c96c9e8d77ad38fe3b20d73920N.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d6e193c96c9e8d77ad38fe3b20d73920N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d6e193c96c9e8d77ad38fe3b20d73920N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exe"C:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exeC:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exe startC:\Users\Admin\AppData\Roaming\AF3F8\6AC2C.exe%C:\Users\Admin\AppData\Roaming\AF3F82⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exeC:\Users\Admin\AppData\Local\Temp\d6e193c96c9e8d77ad38fe3b20d73920N.exe startC:\Program Files (x86)\F82B5\lvvm.exe%C:\Program Files (x86)\F82B52⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Program Files (x86)\LP\2C0A\2617.tmp"C:\Program Files (x86)\LP\2C0A\2617.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b101b984ca9d94f84b3aea0deae080e4
SHA107da7bcb39f6eb9f40c6a7b6ae634c65c282362b
SHA2566bcc18c5d181dde94b30a88f398f952cad4ad47dfa2ffe514062c1dababe2bcf
SHA51231403d91355e6f2ead4623f0f0f42b279cf5b240e1bbf3ffbb2ee8d442d4679d2885e202a01a2d331c216061a1e5b7ac78882a7ff3b976107e3f2dd4cfb7187f
-
Filesize
1KB
MD55799e3a332ae1d22ad2c93c65cf29fbd
SHA17d3a28b6f4b14a51295e6145c3fb81aa0eb00a3c
SHA256a840ca69a53782a9c204d74c3414d01d5050df50559fc37c66822ae0e5e51946
SHA512b68a8f9eb7c93fef33a42bb78638146a51e43307379623d92fcabed687e3e0c4ab2f66d457409121ba57ecf26c9e22d3ab8b79ce892946906fc7b74315d510ba
-
Filesize
600B
MD59abcda8fd4e7d7aeb04ee98f94800430
SHA15ea083f04cf8e70bc102ec8914af1521ef9a2b86
SHA256065fd1f1669e3ca184ed304129c8344c2918f276eea0a9239604807d794acb7b
SHA5126a831beaccf3d0fd9357257f2c70715396882ee7a5638ed2ca0bcf9f49a0f3ee3ce6fcc726138e6386761d42be80eca8df9d96bc8ad6565d14ca86f56fd46d7b
-
Filesize
996B
MD5fd6a39b73a9d57560a74334ae1c0e4bf
SHA1de105543dc5b4415e0b90f9c1405735925b8b436
SHA2561250a797ed91bd316e4bafce6a59d14bc337e1419218a5013b8b10ce9b3275e8
SHA51247ba5a6aeac637adc1116e4f927be580f193340ef6480a79e0e82673eefba6b13efbfc9935c9c9c0c5db0bcaaf64e03d24711df7dc4a520ad93fe45388908d8f
-
Filesize
98KB
MD57bcdd69e096631aa9d2ed6740fea7003
SHA1f9e3911cf42623317a3a2dca1b7c42eef691f106
SHA2563266d081c78f984aa74c555ba61b7f2d80ee98d657cce2e4ce3bd9cd8e77de63
SHA512e1d4b814d1ebab64b43fc074e2dea0fa7af01856cf5fdef52b1687095263af65d6d06ad0589fe51da2ee5c496be5e3ac1195a54af26f0c3f9f2c93057de755d5