Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe
Resource
win10v2004-20240802-en
General
-
Target
78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe
-
Size
7.6MB
-
MD5
0be4a2592f848a5781a73ee60fa20ba6
-
SHA1
85bf09a2f02d66e8aa03147c90f7edd404c8a6aa
-
SHA256
78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4
-
SHA512
84b138f38e92a6ca5614a706dc8788ba218d7f4e0dde691dab18f1b9256def36475181f456435499a183336f5a385641d7d0b7401c22d42fe6ee5116796f0530
-
SSDEEP
98304:K0XCXkHTfN9Z+1jjw+giUMZCq6bFREzaOHSWLu4F:K0XCXkHTfN9QgirZC5YS
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io 7 ipinfo.io 11 api.myip.com 12 api.myip.com 3 api64.ipify.org 4 api64.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30 PID 2148 wrote to memory of 2436 2148 78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe"C:\Users\Admin\AppData\Local\Temp\78023bdaf9f185ff21ad64a6af645fe56a0935c801f85731b8c3a85248e71bd4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565bc56f91ff58c7c3846d3dee31effb5
SHA16d8ea2e7a4bf111c6aca9733d031d6f6aad813be
SHA2564f713a5c8c50737939c18aa6cf6d557e309abd14a461d0189c4413ece7d06e96
SHA512268cd7564c1d4b4edfa65433611b2f05c377eb8ecfbc71904dc9afeda8581c22a4da8249715a26a19ba66669b5e758d116a3006786d347ef67bd49f922788943
-
Filesize
6.4MB
MD500e250e5fdcf6ed6246903accff01130
SHA1ba0cda9d84ddcd79d02bb6d88aaf323feebd05f2
SHA2569df8349c91ff8bdee71cf3e257a0d2f6bab02dffcb92d16de350b9bc2cdef4f7
SHA5121b058ab492e69e614f08baa55d0000014ee9cd9ea7f46bf23ebb4d8b25012c38d3ffb914a3b79a819e429d27f0187ea2171f533e16eadf3dba9e069e40e4adbe
-
Filesize
313KB
MD5a36dc92515ad9a1efd791c57e6b8825b
SHA1787767c3c8717c4f165adc1b20acc9a8352bab06
SHA256e3b5a04c8bc029a519b7edb6f32ef05b48e83f8ba5d78957aaff4900c1abbbad
SHA51274401be47fc01142abd227bc1383958be499dabefff142be673d2b340e17e8944f4ee9d82f07d2380532f7f45eaa1dce2f73b482b17d39da19f9da5d1db0421f
-
Filesize
2.7MB
MD5599395d27217b0b159527ff55ac5bf1e
SHA11247c975a6f556c19a01ecc284de42e120ab27f5
SHA256acee75e211131a2a19d21e3a7b6d228cab0c52166fd57916699392f8ee5c72ff
SHA51222db00d0222082e8d37dcda04b45eb9d5ef9c5c73b829c6bc7c387edf92719a88cdce7833c2db122a14be3114cf419e69ab1239c261e8755f4d37c08d03ab575
-
Filesize
995KB
MD5969c9a7bc2e46a078fac7c27ad79fc56
SHA14047fed227464f275c40b44a1adb49bbb6072b88
SHA256891306bc14e8d196e6f229dfe9d713bb1e81af30efe5ea786672648cbe6fd032
SHA5120285f94d1de7e194d18f53eb1b3ad669fafa0a5dee45e7eab9ebd1e807e65ded235d360969225d0c1a54c8cf97b2da6ad14676320aa621845e28d9a38120ddbb
-
Filesize
10.6MB
MD5079d166295bafa2ab44902c8bf5ff2a5
SHA146e728a035c3fd9618f823a5d0b525a9aa22e1c1
SHA256dbe5fb6a6d567628f7982723f21869f68508397ee6926116554aef37789014d8
SHA512949f278bf199553263d7023349b16f6060506e29518886dff77d913df54b951b0c0026667bbd67a9cdc4c44ae7c174d74ddd7d5520df081d91a1296de095151b
-
Filesize
342KB
MD5dc0d22b7133699183da35835f6dc4d1b
SHA11d5cc388057254f037c10e3ddab6531f9ea5ffad
SHA256a21388b8be0612fb9d0274cba67c88df2d604629322fc0968558dfd28be09cd4
SHA5126135a36911a05654d380e740666dac650ecffd9b47f411012e8e30dfbc954520dbee3e9183984db7f9fc0997785d795305eaf88f5da3116026080fef4c5eee01
-
Filesize
6.3MB
MD595bb292a795c5c517e405f698fbd3fed
SHA1f53472ae5a6ef6c84a22ba968ae52b7b8af2c059
SHA256dbf462d222344d6c78ed9548922560993b9d8bd2a9860b381476310319945d80
SHA512b745d034ccb7666512ac9605877a2631df804cd96c2c3ba343b293524f6f6ea051e63e72ddf755cb7bb14c2f81b8847b7cd6bfa15fb1d78b1b40705e71ef11c4