Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe
Resource
win7-20240903-en
General
-
Target
0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe
-
Size
8.0MB
-
MD5
9691989ff51f7fc8ab2f6f43d7d00ed4
-
SHA1
82be5e566b2bc4fcd9989fcc4129e338b71eaeb4
-
SHA256
0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b
-
SHA512
902fd3abe8eb8a5e3c6548f0ac471d5034df405510ad7f88f56010d18e59f6731ba9ecf89d2fc0eb837755bf66d85686d7fa10094172b86b658e9b78a0958b8f
-
SSDEEP
196608:Sx7DhAj/QmUqyCXyYObER5nREx457iqpl0Kfqnu3wkywaw:ISjYxqbX5OQRV+G7R0KiuRKw
Malware Config
Extracted
cryptbot
eihtvd18vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 5 IoCs
pid Process 2900 VC_redist.x64.exe 2448 VC_redist.x86.exe 2800 service123.exe 1400 service123.exe 2576 service123.exe -
Loads dropped DLL 13 IoCs
pid Process 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 2448 VC_redist.x86.exe 2448 VC_redist.x86.exe 2800 service123.exe 1400 service123.exe 2576 service123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VC_redist.x86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VC_redist.x86.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2900 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 31 PID 596 wrote to memory of 2448 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 32 PID 596 wrote to memory of 2448 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 32 PID 596 wrote to memory of 2448 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 32 PID 596 wrote to memory of 2448 596 0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe 32 PID 2448 wrote to memory of 2800 2448 VC_redist.x86.exe 33 PID 2448 wrote to memory of 2800 2448 VC_redist.x86.exe 33 PID 2448 wrote to memory of 2800 2448 VC_redist.x86.exe 33 PID 2448 wrote to memory of 2800 2448 VC_redist.x86.exe 33 PID 2448 wrote to memory of 2676 2448 VC_redist.x86.exe 34 PID 2448 wrote to memory of 2676 2448 VC_redist.x86.exe 34 PID 2448 wrote to memory of 2676 2448 VC_redist.x86.exe 34 PID 2448 wrote to memory of 2676 2448 VC_redist.x86.exe 34 PID 1416 wrote to memory of 1400 1416 taskeng.exe 37 PID 1416 wrote to memory of 1400 1416 taskeng.exe 37 PID 1416 wrote to memory of 1400 1416 taskeng.exe 37 PID 1416 wrote to memory of 1400 1416 taskeng.exe 37 PID 1416 wrote to memory of 2576 1416 taskeng.exe 39 PID 1416 wrote to memory of 2576 1416 taskeng.exe 39 PID 1416 wrote to memory of 2576 1416 taskeng.exe 39 PID 1416 wrote to memory of 2576 1416 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe"C:\Users\Admin\AppData\Local\Temp\0a69d3ba92afa086f53a06a4cad12eb3cd866cc3498f0ab7c0b762949226b52b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E592DC5-34A8-4C44-A5FD-B885FF011CF6} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.5MB
MD598b941f7d27784673cfee33a67c2a6af
SHA1894acf7f7bd276caab3f7b090c43c5803c2068c4
SHA2567b796534a2751b12db07d851038a11aa11681e7062cbffbe37456ffccd52f434
SHA5121ac33e7c671601e0ce5594d13e2d9c8b79a362a1dc3c618312b70f22d235798e0911990088cb0457001522ec25381af980585784797b88f1ecd71b5ebf4403ad
-
Filesize
6.4MB
MD526416a887535a36af2e12c27489465b9
SHA16640c75bc2a0550e0aacdefaa17ed09072226cef
SHA256faa27c3fbb27293665ae5d80c4401dbb7f877a55bbcc3010892242e2cbfee9af
SHA5122a0a90ceabeac88d6b6c57d7d2a12650106f8d85e5b39e12793805e472f6dc6430696a85f79b9de56398607cd347b34175662962123c4761aeb89533b62ab273