Analysis
-
max time kernel
141s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe
Resource
win7-20240729-en
General
-
Target
9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe
-
Size
6.3MB
-
MD5
6e860af01695658d323ab44a31ba7c6b
-
SHA1
1979b1ca9019f3f06caf3c5cb693f0b231914013
-
SHA256
9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27
-
SHA512
8be53bddb6be33eeab9a240b6b3c5224e48390dceb0778f2867f91eb2dd39415ae277a16868d491e50a8eb3d9786bfea8abb04a3de266ab5dbc022e6ebcea2ef
-
SSDEEP
49152:ZwLJPgbiuVmmAHi0AwnvAtix2jm5q+98j56xW2jKrWDahVg6eWt6v9N60WICDZof:inxjj2gPsO9vwOqAcwdixZIW6
Malware Config
Extracted
cryptbot
analforeverlovyu.top
thirtvf13vt.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2472 service123.exe 3056 service123.exe 576 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 2472 service123.exe 3056 service123.exe 576 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2472 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 29 PID 2420 wrote to memory of 2472 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 29 PID 2420 wrote to memory of 2472 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 29 PID 2420 wrote to memory of 2472 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 29 PID 2420 wrote to memory of 1528 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 30 PID 2420 wrote to memory of 1528 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 30 PID 2420 wrote to memory of 1528 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 30 PID 2420 wrote to memory of 1528 2420 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe 30 PID 3044 wrote to memory of 3056 3044 taskeng.exe 33 PID 3044 wrote to memory of 3056 3044 taskeng.exe 33 PID 3044 wrote to memory of 3056 3044 taskeng.exe 33 PID 3044 wrote to memory of 3056 3044 taskeng.exe 33 PID 3044 wrote to memory of 576 3044 taskeng.exe 34 PID 3044 wrote to memory of 576 3044 taskeng.exe 34 PID 3044 wrote to memory of 576 3044 taskeng.exe 34 PID 3044 wrote to memory of 576 3044 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe"C:\Users\Admin\AppData\Local\Temp\9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {57FCEC09-2EB5-4BC6-991A-7DE291328C7D} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576
-