Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe
-
Size
262KB
-
MD5
ed9e7aca805a43c002de1ed96f877250
-
SHA1
5af8a62eb6a53d7a329b1db6ce295984bc2f5921
-
SHA256
1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137
-
SHA512
39c540f5c0b9c6eb81102463464d5e19ca79d64873da5953dbffd16de46cbbc4a61ab7d841bfcaab087f9ead3277995e4e5f9b3bc3d7cff6f827db2e6496bbec
-
SSDEEP
6144:tDzTWWSou7pynipJzUnDON5VO1UBHHGgbsd7WA9s:1TL87pynipJInDON5VO1EH1bU7o
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2832 1287.tmp -
Loads dropped DLL 2 IoCs
pid Process 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A42.exe = "C:\\Program Files (x86)\\LP\\1DB2\\A42.exe" 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2876-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2876-4-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2876-14-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2876-15-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2864-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2864-19-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2936-176-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2876-177-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2876-312-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2876-316-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1DB2\A42.exe 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe File opened for modification C:\Program Files (x86)\LP\1DB2\1287.tmp 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe File opened for modification C:\Program Files (x86)\LP\1DB2\A42.exe 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1287.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2780 msiexec.exe Token: SeTakeOwnershipPrivilege 2780 msiexec.exe Token: SeSecurityPrivilege 2780 msiexec.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe Token: 33 2988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2988 AUDIODG.EXE Token: 33 2988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2988 AUDIODG.EXE Token: SeShutdownPrivilege 764 explorer.exe Token: SeShutdownPrivilege 764 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2864 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 31 PID 2876 wrote to memory of 2864 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 31 PID 2876 wrote to memory of 2864 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 31 PID 2876 wrote to memory of 2864 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 31 PID 2876 wrote to memory of 2936 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 33 PID 2876 wrote to memory of 2936 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 33 PID 2876 wrote to memory of 2936 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 33 PID 2876 wrote to memory of 2936 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 33 PID 2876 wrote to memory of 2832 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 37 PID 2876 wrote to memory of 2832 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 37 PID 2876 wrote to memory of 2832 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 37 PID 2876 wrote to memory of 2832 2876 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe"C:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exeC:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe startC:\Users\Admin\AppData\Roaming\2D2E7\1F41D.exe%C:\Users\Admin\AppData\Roaming\2D2E72⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exeC:\Users\Admin\AppData\Local\Temp\1d25b594ec0e706d43ecafe3785eee97329c077684d3ca43c5581d255e589137N.exe startC:\Program Files (x86)\E79E7\lvvm.exe%C:\Program Files (x86)\E79E72⤵PID:2936
-
-
C:\Program Files (x86)\LP\1DB2\1287.tmp"C:\Program Files (x86)\LP\1DB2\1287.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:764
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD50e03940f6e29d9f4672e0dff10af16e3
SHA11c917aacf2ecd0b3fde0922e942cd5cf15cf4e87
SHA256f8c047181a60e27c0f4cf9bd1139466f9251a401914fe2c71582246e67af51da
SHA512e254cdde8b3250ee198567bd83161bbd7ccb2cd731d83ec8b4b10eb48aae02375ba2acc849557c5b77e8c3c52bbfa07e0ed38ae17bb0a81963af69a22ccfb4f2
-
Filesize
600B
MD5ab00bcfb6cbf36a48fcc264f44f17dcc
SHA10ce12f6a95293eb724b9b4a9f153f5b22e5da5a1
SHA25616d760b63d686807982459f880a1dd6958b79a1abb8d2b1d8499c0f6fdd6eed5
SHA512b4ff35ebbae8312272d0648e557515d1610d65c6a1e90fd23622399340cd0cde0d73b65b46d49dab268385131b7148aadc8d7cc22f31f5dfbd19624ea4f69211
-
Filesize
94KB
MD58bb64335e05f4f9c869d18d54a7bbbaf
SHA1e5494fa2bec648279c0519671277e1294204e429
SHA2562fe8c59f49b84eb9ae9244c45362cdd44979f73d81d940dafea9b818019bfea8
SHA5126b720b4af7f7069488940bd3b60b19389b0389dd28618f80df5c3711b380d8216837b83336f80e45759505da727e10a4d9c87cfcd878dd0fbf29a524420465fb