Analysis
-
max time kernel
143s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe
Resource
win7-20240729-en
General
-
Target
cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe
-
Size
9.5MB
-
MD5
bb85c40120dac356bfc311f4774d3439
-
SHA1
bdcc094a88aa8971753da0c86e05c68578e5ce84
-
SHA256
cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d
-
SHA512
d15e22befdcc9de94b68552e87d3175694e5d70cc4577d9916a523e34bbaee65991730fe71cc4075561c7247ff8d8e7126ce1b4a7f795d2fa3c7276604a32e05
-
SSDEEP
49152:G+ACxZPpFDaaekodusejnK99nJeO+3nXn0Ext9V6qrzDTAQg0JZ+Wm+vfYM8sF1K:G+zxZxhUkIeG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2896 service123.exe 2220 service123.exe 1572 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 2896 service123.exe 2220 service123.exe 1572 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2896 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 29 PID 2268 wrote to memory of 2896 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 29 PID 2268 wrote to memory of 2896 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 29 PID 2268 wrote to memory of 2896 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 29 PID 2268 wrote to memory of 2972 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 30 PID 2268 wrote to memory of 2972 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 30 PID 2268 wrote to memory of 2972 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 30 PID 2268 wrote to memory of 2972 2268 cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe 30 PID 2900 wrote to memory of 2220 2900 taskeng.exe 33 PID 2900 wrote to memory of 2220 2900 taskeng.exe 33 PID 2900 wrote to memory of 2220 2900 taskeng.exe 33 PID 2900 wrote to memory of 2220 2900 taskeng.exe 33 PID 2900 wrote to memory of 1572 2900 taskeng.exe 34 PID 2900 wrote to memory of 1572 2900 taskeng.exe 34 PID 2900 wrote to memory of 1572 2900 taskeng.exe 34 PID 2900 wrote to memory of 1572 2900 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe"C:\Users\Admin\AppData\Local\Temp\cff579e5facdd493e0b023979049f4504ffc611c352a7d97928943e61c66dd0d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AF01F916-65D7-45B5-83E9-9777E82CAFC9} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572
-