Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
Mineral.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mineral.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mineral.txt.lnk
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
mineral.txt.lnk
Resource
win10v2004-20241007-en
General
-
Target
Mineral.exe
-
Size
367KB
-
MD5
60847eef908d4c371a64d58efeb80f2f
-
SHA1
1587b41a9c28a3d52923c2cb6f395d2487ecbf38
-
SHA256
1665090883b9e3aa77b433bd241c4aa97290f3f8591e8d69cabe3b70bb3f2256
-
SHA512
82c18aa0bdeba0d15db8c11182b8992c4cab631c362a8270a9bab80cece69d80d42dfd8ce18bedb3dca711801750a25ec23cbbcd191d7e4abe90cda6fc7b036a
-
SSDEEP
6144:LapTuicHTfnb2e3kPZrHd/9OvTMqgjzIFgikmVZtmFs/t4pJzf9x7jL9FOwSvAN:LkuicHTfnb2eyZrH/SgukmtmFs/sJf95
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 2428 2072 Mineral.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mineral.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mineral.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2704 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2072 Mineral.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2072 wrote to memory of 2428 2072 Mineral.exe 30 PID 2428 wrote to memory of 2704 2428 Mineral.exe 31 PID 2428 wrote to memory of 2704 2428 Mineral.exe 31 PID 2428 wrote to memory of 2704 2428 Mineral.exe 31 PID 2428 wrote to memory of 2704 2428 Mineral.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mineral.exe"C:\Users\Admin\AppData\Local\Temp\Mineral.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Mineral.exeC:\Users\Admin\AppData\Local\Temp\Mineral.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\tz.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD543b74d7907aa3c1fe4b66036524db6b4
SHA14edc48dff0a3e3b0cc2a15c35d4ca11d29be611d
SHA256ba321335a92987133d1e69d6a8fb73fe2accd6f4f2b414a714cbb63df51f0cd7
SHA5120059e16aac1ac7378c7da20d08b38d83df9216f158017c00c24ecfad053fd805124eb7d58a0a917feb480b70037dd7c02e4ce43bdb5a9e0480ab460c409f91d1