Overview
overview
7Static
static
5malware.exe
windows7-x64
3malware.exe
windows10-2004-x64
3malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
3malware.exe
windows10-2004-x64
3malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
5Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 08:58
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
malware.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
malware.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
malware.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
malware.exe
Resource
win7-20240903-en
General
-
Target
malware.exe
-
Size
80KB
-
MD5
0f37839f48f7fc77e6d50e14657fb96e
-
SHA1
35698c61ad232ff90c5812372d23971118ea37cd
-
SHA256
f097ad77b99b3744994a646d6a3577cea2faa8b9e656fcccbbd73244e227c850
-
SHA512
72bf97c978cd4319198ac5a379d224ddc90e471251e9d817a2fe9ab362cbaab9f5f6647f2261689ddd8f340cce04e602e38faf907ac543ee5d4ad7ef23e3cbd5
-
SSDEEP
1536:CtX20yVt4dA3bfyF6FwfxQ8WPmNgPez/FpaWD0i2CVyPBQcc0WYQirQ9Z:eZ0u6LBqJdWPdPezTmiRmiQ8irQH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5024 cleansweep.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cleansweep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3276 malware.exe 3276 malware.exe 3276 malware.exe 3276 malware.exe 5024 cleansweep.exe 5024 cleansweep.exe 5024 cleansweep.exe 5024 cleansweep.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3276 malware.exe Token: SeDebugPrivilege 3276 malware.exe Token: SeDebugPrivilege 5024 cleansweep.exe Token: SeDebugPrivilege 5024 cleansweep.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 3412 3276 malware.exe 56 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 612 3276 malware.exe 5 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7 PID 3276 wrote to memory of 672 3276 malware.exe 7
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:800
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2980
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3748
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3840
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3904
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3992
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3332
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:5016
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1844
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4712
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2440
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2904
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1444
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1516
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1996
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2620
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\cleansweep.exe\cleansweep.exe"C:\cleansweep.exe\cleansweep.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2668
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:5116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50f37839f48f7fc77e6d50e14657fb96e
SHA135698c61ad232ff90c5812372d23971118ea37cd
SHA256f097ad77b99b3744994a646d6a3577cea2faa8b9e656fcccbbd73244e227c850
SHA51272bf97c978cd4319198ac5a379d224ddc90e471251e9d817a2fe9ab362cbaab9f5f6647f2261689ddd8f340cce04e602e38faf907ac543ee5d4ad7ef23e3cbd5
-
Filesize
279B
MD52c4c2e4cc5999e5902c534618cd6b349
SHA13af95b9672e85ea2fc6d38e65b6270a4af40a773
SHA256fd42953765337532984a0a760460fd9c2d36a473ada38eca0bbf13eb8309d745
SHA5129006b5f41b34d411ba47ffedf658c41dbb3e1374cc5dcccbc18c70c54b8f08e8b70d1f60d05e40ff7a9b2741aaa86de72a219df9eed521b8f93a9ee1c40b13e1