Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win10v2004-20240802-en
General
-
Target
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
-
Size
8.5MB
-
MD5
a9a36a8aed8eb3d7e2e6cf408ec6419c
-
SHA1
5a149503bdc2ef6af39b926ce67a65e1cd1ce912
-
SHA256
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
SHA512
a77c3f2e1d7e61ceb2a60d73742a3bc3a448f09b9994e67abfe5fcd582b48589017719a38c4deef1351becdd844ff9cca2ddda45a29ff9ffa95394c903e8a596
-
SSDEEP
196608:cm+wIFMhaDN3lXzh9caTDv7Q4rwfmEjk2gunMnoZbM:L+7GhWpzjAgsTjpqnCQ
Malware Config
Extracted
cryptbot
forcj4vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 7 IoCs
pid Process 2068 JAPxzozvZa.exe 2240 KMSpico.exe 2744 Setup.exe 2952 Setup.tmp 3020 service123.exe 1936 service123.exe 1248 service123.exe -
Loads dropped DLL 16 IoCs
pid Process 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 2240 KMSpico.exe 2744 Setup.exe 2952 Setup.tmp 2952 Setup.tmp 2068 JAPxzozvZa.exe 2068 JAPxzozvZa.exe 3020 service123.exe 1936 service123.exe 1248 service123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2240 KMSpico.exe 2240 KMSpico.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JAPxzozvZa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JAPxzozvZa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JAPxzozvZa.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 KMSpico.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 Setup.tmp -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2068 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 30 PID 2452 wrote to memory of 2068 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 30 PID 2452 wrote to memory of 2068 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 30 PID 2452 wrote to memory of 2068 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 30 PID 2452 wrote to memory of 2240 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 32 PID 2452 wrote to memory of 2240 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 32 PID 2452 wrote to memory of 2240 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 32 PID 2452 wrote to memory of 2240 2452 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 32 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2240 wrote to memory of 2744 2240 KMSpico.exe 33 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2744 wrote to memory of 2952 2744 Setup.exe 34 PID 2068 wrote to memory of 3020 2068 JAPxzozvZa.exe 35 PID 2068 wrote to memory of 3020 2068 JAPxzozvZa.exe 35 PID 2068 wrote to memory of 3020 2068 JAPxzozvZa.exe 35 PID 2068 wrote to memory of 3020 2068 JAPxzozvZa.exe 35 PID 2068 wrote to memory of 2936 2068 JAPxzozvZa.exe 36 PID 2068 wrote to memory of 2936 2068 JAPxzozvZa.exe 36 PID 2068 wrote to memory of 2936 2068 JAPxzozvZa.exe 36 PID 2068 wrote to memory of 2936 2068 JAPxzozvZa.exe 36 PID 1456 wrote to memory of 1936 1456 taskeng.exe 39 PID 1456 wrote to memory of 1936 1456 taskeng.exe 39 PID 1456 wrote to memory of 1936 1456 taskeng.exe 39 PID 1456 wrote to memory of 1936 1456 taskeng.exe 39 PID 1456 wrote to memory of 1248 1456 taskeng.exe 40 PID 1456 wrote to memory of 1248 1456 taskeng.exe 40 PID 1456 wrote to memory of 1248 1456 taskeng.exe 40 PID 1456 wrote to memory of 1248 1456 taskeng.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe"C:\Users\Admin\AppData\Local\Temp\0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\JAPxzozvZa.exe"C:\Users\Admin\AppData\Local\Temp\JAPxzozvZa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\KMSpico.exe"C:\Users\Admin\AppData\Local\Temp\KMSpico.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\is-EASBU.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-EASBU.tmp\Setup.tmp" /SL5="$60152,2952592,69120,C:\Users\Admin\AppData\Local\Temp\Setup.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2952
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B0BC52AC-51C0-4079-8F62-943E4E717A06} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD53713f5a24207bd5ba5c1401be6e62834
SHA10ee2a922f96bd11655ec2dceb4c84a3640c36090
SHA2563ead984a8553300904b67328c72805dbfe8cd7d57ba5fb54e6d3fa3e4afdfdfe
SHA512a4674da162f39d01aa76940074648c0b6c82465a81af6ae2bdb52ad7f765bb7de76a111baac427e1cd248a63aa45186adc693172dce7679803a8911f66c33d8c
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
703KB
MD51778c1f66ff205875a6435a33229ab3c
SHA15b6189159b16c6f85feed66834af3e06c0277a19
SHA25695c06acac4fe4598840e5556f9613d43aa1039c52dac64536f59e45a70f79da6
SHA5128844de1296ce707e3c5c71823f5118f8f2e50287ace3a2ee1ec0b69df0ec48ebcf5b755db669d2cd869d345fb06a9c07b36e98eda8c32a9b26b8fe22bdc105a0