Analysis
-
max time kernel
291s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe
Resource
win10-20240611-en
General
-
Target
79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe
-
Size
6.4MB
-
MD5
99848d0ddfc95e855c62d8932845ae6f
-
SHA1
fc08e3d98922bc5de0c89968512c3fd778ba5e4b
-
SHA256
79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84
-
SHA512
cf4194368335e63a42408f89102d85cd5f9ca8bb640970ee92ac4e95118b9cfc31a7c3a36b8bcdd84431648328c40c9b44333eb62fd639b1960d783ffd5e217d
-
SSDEEP
98304:BkuXLm0IH9OJy/fZ6IcLWTMEKJRnghQICSeli4EekEJ:BXXLmz9OJyXZ6IkkArsQAqiPekEJ
Malware Config
Extracted
cryptbot
analforeverlovyu.top
tventyvf20pt.top
-
url_path
/v1/upload.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 6 IoCs
pid Process 2864 service123.exe 2880 service123.exe 2344 service123.exe 900 service123.exe 1604 service123.exe 2304 service123.exe -
Loads dropped DLL 8 IoCs
pid Process 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 2864 service123.exe 2880 service123.exe 2344 service123.exe 900 service123.exe 1604 service123.exe 2304 service123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2864 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 31 PID 1728 wrote to memory of 2864 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 31 PID 1728 wrote to memory of 2864 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 31 PID 1728 wrote to memory of 2864 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 31 PID 1728 wrote to memory of 2732 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 32 PID 1728 wrote to memory of 2732 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 32 PID 1728 wrote to memory of 2732 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 32 PID 1728 wrote to memory of 2732 1728 79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe 32 PID 3028 wrote to memory of 2880 3028 taskeng.exe 35 PID 3028 wrote to memory of 2880 3028 taskeng.exe 35 PID 3028 wrote to memory of 2880 3028 taskeng.exe 35 PID 3028 wrote to memory of 2880 3028 taskeng.exe 35 PID 3028 wrote to memory of 2344 3028 taskeng.exe 36 PID 3028 wrote to memory of 2344 3028 taskeng.exe 36 PID 3028 wrote to memory of 2344 3028 taskeng.exe 36 PID 3028 wrote to memory of 2344 3028 taskeng.exe 36 PID 3028 wrote to memory of 900 3028 taskeng.exe 37 PID 3028 wrote to memory of 900 3028 taskeng.exe 37 PID 3028 wrote to memory of 900 3028 taskeng.exe 37 PID 3028 wrote to memory of 900 3028 taskeng.exe 37 PID 3028 wrote to memory of 1604 3028 taskeng.exe 38 PID 3028 wrote to memory of 1604 3028 taskeng.exe 38 PID 3028 wrote to memory of 1604 3028 taskeng.exe 38 PID 3028 wrote to memory of 1604 3028 taskeng.exe 38 PID 3028 wrote to memory of 2304 3028 taskeng.exe 39 PID 3028 wrote to memory of 2304 3028 taskeng.exe 39 PID 3028 wrote to memory of 2304 3028 taskeng.exe 39 PID 3028 wrote to memory of 2304 3028 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe"C:\Users\Admin\AppData\Local\Temp\79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6733A23A-A4B0-4A09-8E9B-D9AC9967A74B} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304
-