Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win10v2004-20240802-en
General
-
Target
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
-
Size
8.5MB
-
MD5
a9a36a8aed8eb3d7e2e6cf408ec6419c
-
SHA1
5a149503bdc2ef6af39b926ce67a65e1cd1ce912
-
SHA256
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
SHA512
a77c3f2e1d7e61ceb2a60d73742a3bc3a448f09b9994e67abfe5fcd582b48589017719a38c4deef1351becdd844ff9cca2ddda45a29ff9ffa95394c903e8a596
-
SSDEEP
196608:cm+wIFMhaDN3lXzh9caTDv7Q4rwfmEjk2gunMnoZbM:L+7GhWpzjAgsTjpqnCQ
Malware Config
Extracted
cryptbot
forcj4vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation KMSpico.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation JAPxzozvZa.exe -
Executes dropped EXE 7 IoCs
pid Process 2764 JAPxzozvZa.exe 4680 KMSpico.exe 2976 Setup.exe 3912 Setup.tmp 812 service123.exe 3628 service123.exe 4676 service123.exe -
Loads dropped DLL 3 IoCs
pid Process 812 service123.exe 3628 service123.exe 4676 service123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4680 KMSpico.exe 4680 KMSpico.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JAPxzozvZa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JAPxzozvZa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JAPxzozvZa.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 KMSpico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString KMSpico.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4680 KMSpico.exe 4680 KMSpico.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2764 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 86 PID 4212 wrote to memory of 2764 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 86 PID 4212 wrote to memory of 2764 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 86 PID 4212 wrote to memory of 4680 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 88 PID 4212 wrote to memory of 4680 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 88 PID 4212 wrote to memory of 4680 4212 0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe 88 PID 4680 wrote to memory of 2976 4680 KMSpico.exe 94 PID 4680 wrote to memory of 2976 4680 KMSpico.exe 94 PID 4680 wrote to memory of 2976 4680 KMSpico.exe 94 PID 2976 wrote to memory of 3912 2976 Setup.exe 95 PID 2976 wrote to memory of 3912 2976 Setup.exe 95 PID 2976 wrote to memory of 3912 2976 Setup.exe 95 PID 2764 wrote to memory of 812 2764 JAPxzozvZa.exe 99 PID 2764 wrote to memory of 812 2764 JAPxzozvZa.exe 99 PID 2764 wrote to memory of 812 2764 JAPxzozvZa.exe 99 PID 2764 wrote to memory of 4244 2764 JAPxzozvZa.exe 100 PID 2764 wrote to memory of 4244 2764 JAPxzozvZa.exe 100 PID 2764 wrote to memory of 4244 2764 JAPxzozvZa.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe"C:\Users\Admin\AppData\Local\Temp\0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\JAPxzozvZa.exe"C:\Users\Admin\AppData\Local\Temp\JAPxzozvZa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\KMSpico.exe"C:\Users\Admin\AppData\Local\Temp\KMSpico.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\is-N9RG5.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-N9RG5.tmp\Setup.tmp" /SL5="$B0062,2952592,69120,C:\Users\Admin\AppData\Local\Temp\Setup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3628
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD53713f5a24207bd5ba5c1401be6e62834
SHA10ee2a922f96bd11655ec2dceb4c84a3640c36090
SHA2563ead984a8553300904b67328c72805dbfe8cd7d57ba5fb54e6d3fa3e4afdfdfe
SHA512a4674da162f39d01aa76940074648c0b6c82465a81af6ae2bdb52ad7f765bb7de76a111baac427e1cd248a63aa45186adc693172dce7679803a8911f66c33d8c
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
703KB
MD51778c1f66ff205875a6435a33229ab3c
SHA15b6189159b16c6f85feed66834af3e06c0277a19
SHA25695c06acac4fe4598840e5556f9613d43aa1039c52dac64536f59e45a70f79da6
SHA5128844de1296ce707e3c5c71823f5118f8f2e50287ace3a2ee1ec0b69df0ec48ebcf5b755db669d2cd869d345fb06a9c07b36e98eda8c32a9b26b8fe22bdc105a0