Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe
Resource
win7-20240708-en
General
-
Target
7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe
-
Size
6.3MB
-
MD5
9c6348961ddfb93988d54adff5e45bfa
-
SHA1
7fd1bbdb3f4e024d74b38088d99c5f3bee8f28f5
-
SHA256
7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434
-
SHA512
2cb4b575738c33865bd656225c560ec837f832d8bf8e9927fc5e154b2ad6f65a1ee53b275fb10894ea9bcf813cc5e6d99f8aa8ba2bd4b3d7ebbd4e44620cd02d
-
SSDEEP
49152:iQhbGEGVCjdEbS7IhzjyHP+M8zArBpP+puwK8kkIYjrSXmF+kTV7XU0Bt8su/hY9:2bSGSHH8zzEV8kk5S2FpVtBM/hYCx1E3
Malware Config
Extracted
cryptbot
twelvevf12vt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3040 service123.exe 2920 service123.exe 1300 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 3040 service123.exe 2920 service123.exe 1300 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3040 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 30 PID 2668 wrote to memory of 3040 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 30 PID 2668 wrote to memory of 3040 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 30 PID 2668 wrote to memory of 3040 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 30 PID 2668 wrote to memory of 2584 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 31 PID 2668 wrote to memory of 2584 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 31 PID 2668 wrote to memory of 2584 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 31 PID 2668 wrote to memory of 2584 2668 7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe 31 PID 796 wrote to memory of 2920 796 taskeng.exe 34 PID 796 wrote to memory of 2920 796 taskeng.exe 34 PID 796 wrote to memory of 2920 796 taskeng.exe 34 PID 796 wrote to memory of 2920 796 taskeng.exe 34 PID 796 wrote to memory of 1300 796 taskeng.exe 35 PID 796 wrote to memory of 1300 796 taskeng.exe 35 PID 796 wrote to memory of 1300 796 taskeng.exe 35 PID 796 wrote to memory of 1300 796 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe"C:\Users\Admin\AppData\Local\Temp\7a35c91fbd4871c10b50ecb9184da53ff57f61e3bd242347b108d7eaf2327434.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {62D150D2-98D5-4A6D-A346-B42CE9B59A3B} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300
-