General
-
Target
networkintegrityservice.exe
-
Size
14.6MB
-
Sample
241127-2arywazjbl
-
MD5
63f8d0f6f8ff3fadebe4442b29a6e620
-
SHA1
e3ae4e555904f545c3cf60d2890cedcba1ee6d2e
-
SHA256
5f346eb7606a002be7b0d776838c28a606ad6e0416fa9668d0561d42099da27d
-
SHA512
af9a8119c4f0fbf5912b7bbb2167d99c96e66c7983abff60f1b45d505e0194a4d93e8eb2a4fd24de40bd922673fc22fbd488ab750edad447657a6ae4f979c267
-
SSDEEP
393216:w22L63hucWdQusl/l9foWOv+9rzIdEwGhSOIQ/RoPE:j53hrWdQuIhorvSr8Ww+SkRoPE
Behavioral task
behavioral1
Sample
networkintegrityservice.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
networkintegrityservice.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
networkintegrityservice.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
networkintegrityservice.exe
-
Size
14.6MB
-
MD5
63f8d0f6f8ff3fadebe4442b29a6e620
-
SHA1
e3ae4e555904f545c3cf60d2890cedcba1ee6d2e
-
SHA256
5f346eb7606a002be7b0d776838c28a606ad6e0416fa9668d0561d42099da27d
-
SHA512
af9a8119c4f0fbf5912b7bbb2167d99c96e66c7983abff60f1b45d505e0194a4d93e8eb2a4fd24de40bd922673fc22fbd488ab750edad447657a6ae4f979c267
-
SSDEEP
393216:w22L63hucWdQusl/l9foWOv+9rzIdEwGhSOIQ/RoPE:j53hrWdQuIhorvSr8Ww+SkRoPE
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Subvert Trust Controls
1Gatekeeper Bypass
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1File and Directory Discovery
1Network Service Discovery
2Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1