Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe
Resource
win10v2004-20240802-en
General
-
Target
c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe
-
Size
1.0MB
-
MD5
02453246b5067537950d1440b0d60180
-
SHA1
c3649098ff1658c4f3b23c859b86a4beabde6045
-
SHA256
c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610
-
SHA512
bd8c6d789ab8b349887765b22f922d4435e2b3fb83301a3037bde9dde2f68d67e313e1e3ae473969aace2a3a28346db2475dde1904b11c4570354e19637c8193
-
SSDEEP
24576:gAH0DOLjiNPvX+vWTbTP+7zDA+cdiToEqVS7psOLC:gAH0CCNXiWTbT+nwd+po
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkNotifyer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe" c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 -
resource yara_rule behavioral1/memory/3064-19-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-17-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-16-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-24-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-23-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-22-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-21-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-20-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-25-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-26-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-27-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-29-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-32-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-34-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-41-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-40-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral1/memory/3064-43-0x0000000000400000-0x0000000000645000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3040 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 28 PID 1344 wrote to memory of 3040 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 28 PID 1344 wrote to memory of 3040 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 28 PID 1344 wrote to memory of 3040 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 28 PID 1344 wrote to memory of 2552 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 29 PID 1344 wrote to memory of 2552 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 29 PID 1344 wrote to memory of 2552 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 29 PID 1344 wrote to memory of 2552 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 29 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30 PID 1344 wrote to memory of 3064 1344 c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe"C:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exeC:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe2⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exeC:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe2⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exeC:\Users\Admin\AppData\Local\Temp\c61caa2b176b68b71625b76386e128ba15454d53916cb83ce80c5c10c36b9610N.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1