Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 20:10
Behavioral task
behavioral1
Sample
19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe
Resource
win7-20240903-en
General
-
Target
19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe
-
Size
6.3MB
-
MD5
94900e0695ddab53645fa9ca8d2ef416
-
SHA1
f1c6ed26cee4f3a55b3f2a7382c2319791e4182d
-
SHA256
19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a
-
SHA512
118e077215b857f00abf805199cfc7777053e9bb542a3947e9d3047a8a27a8d09f344fd8ea62414b8ca65b35ece719bfdec2ccfd6f51eba356d341809670541c
-
SSDEEP
49152:Tt3MuDOhzPKBq2GE+VK5M5mzotlVpEinKk0O6JYsG/rlWlwTCWpv67FNhezgRn6h:yE+VAi/rlW2Ggv67F/ezgNfUK2iSap0h
Malware Config
Extracted
cryptbot
forvh14pt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2564 service123.exe 2896 service123.exe 448 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 2564 service123.exe 2896 service123.exe 448 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2564 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 30 PID 2812 wrote to memory of 2564 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 30 PID 2812 wrote to memory of 2564 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 30 PID 2812 wrote to memory of 2564 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 30 PID 2812 wrote to memory of 2628 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 31 PID 2812 wrote to memory of 2628 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 31 PID 2812 wrote to memory of 2628 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 31 PID 2812 wrote to memory of 2628 2812 19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe 31 PID 2364 wrote to memory of 2896 2364 taskeng.exe 35 PID 2364 wrote to memory of 2896 2364 taskeng.exe 35 PID 2364 wrote to memory of 2896 2364 taskeng.exe 35 PID 2364 wrote to memory of 2896 2364 taskeng.exe 35 PID 2364 wrote to memory of 448 2364 taskeng.exe 36 PID 2364 wrote to memory of 448 2364 taskeng.exe 36 PID 2364 wrote to memory of 448 2364 taskeng.exe 36 PID 2364 wrote to memory of 448 2364 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe"C:\Users\Admin\AppData\Local\Temp\19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {86991A29-3050-4957-864E-6A855D8CDEE2} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448
-