Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
Resource
win10v2004-20241007-en
General
-
Target
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
-
Size
1.1MB
-
MD5
10b99eb3717353b52569a5a1e9234637
-
SHA1
5d46936d5cef95fdb572a50e866497b82fc023e9
-
SHA256
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853
-
SHA512
27474a1031e212f4ec66e5a203602312f20625025d6559466d365f7f8b8c1f2eacdd6107fa6151a08c4e428bbd21beb9681f1aff89cab7540a08e66cdc01b8f8
-
SSDEEP
24576:w06qmrWqPh8mEa3H1WG+34OJ0CFpD0Yn+511xRZ8q2XoHWwb4:8rWI8jYH1m4OJ0gpD0Y+rYl
Malware Config
Extracted
raccoon
b76017a227a0d879dec7c76613918569d03892fb
-
url4cnc
http://telegka.top/brikitiki
http://telegin.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
scarsa.ac.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Oski family
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral1/memory/2720-22-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2720-27-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2720-25-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2720-20-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 -
Raccoon family
-
Executes dropped EXE 6 IoCs
pid Process 2264 Gpbwrbwuaconsoleapp17.exe 2680 Gpbwrbwuaconsoleapp17.exe 2272 Gpbwrbwuaconsoleapp17.exe 2252 Gpbwrbwuaconsoleapp17.exe 2704 Wrygpxuoiconsoleapp4.exe 384 Wrygpxuoiconsoleapp4.exe -
Loads dropped DLL 11 IoCs
pid Process 1284 WScript.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2632 WScript.exe 2704 Wrygpxuoiconsoleapp4.exe 1580 WerFault.exe 1580 WerFault.exe 1580 WerFault.exe 1580 WerFault.exe 1580 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1328 set thread context of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 2264 set thread context of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2704 set thread context of 384 2704 Wrygpxuoiconsoleapp4.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1580 384 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpbwrbwuaconsoleapp17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wrygpxuoiconsoleapp4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wrygpxuoiconsoleapp4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpbwrbwuaconsoleapp17.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2264 Gpbwrbwuaconsoleapp17.exe 2704 Wrygpxuoiconsoleapp4.exe 2704 Wrygpxuoiconsoleapp4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe Token: SeDebugPrivilege 2264 Gpbwrbwuaconsoleapp17.exe Token: SeDebugPrivilege 2704 Wrygpxuoiconsoleapp4.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1284 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 31 PID 1328 wrote to memory of 1284 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 31 PID 1328 wrote to memory of 1284 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 31 PID 1328 wrote to memory of 1284 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 31 PID 1284 wrote to memory of 2264 1284 WScript.exe 32 PID 1284 wrote to memory of 2264 1284 WScript.exe 32 PID 1284 wrote to memory of 2264 1284 WScript.exe 32 PID 1284 wrote to memory of 2264 1284 WScript.exe 32 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 1328 wrote to memory of 2720 1328 64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe 33 PID 2264 wrote to memory of 2632 2264 Gpbwrbwuaconsoleapp17.exe 34 PID 2264 wrote to memory of 2632 2264 Gpbwrbwuaconsoleapp17.exe 34 PID 2264 wrote to memory of 2632 2264 Gpbwrbwuaconsoleapp17.exe 34 PID 2264 wrote to memory of 2632 2264 Gpbwrbwuaconsoleapp17.exe 34 PID 2264 wrote to memory of 2680 2264 Gpbwrbwuaconsoleapp17.exe 35 PID 2264 wrote to memory of 2680 2264 Gpbwrbwuaconsoleapp17.exe 35 PID 2264 wrote to memory of 2680 2264 Gpbwrbwuaconsoleapp17.exe 35 PID 2264 wrote to memory of 2680 2264 Gpbwrbwuaconsoleapp17.exe 35 PID 2264 wrote to memory of 2272 2264 Gpbwrbwuaconsoleapp17.exe 36 PID 2264 wrote to memory of 2272 2264 Gpbwrbwuaconsoleapp17.exe 36 PID 2264 wrote to memory of 2272 2264 Gpbwrbwuaconsoleapp17.exe 36 PID 2264 wrote to memory of 2272 2264 Gpbwrbwuaconsoleapp17.exe 36 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2264 wrote to memory of 2252 2264 Gpbwrbwuaconsoleapp17.exe 37 PID 2632 wrote to memory of 2704 2632 WScript.exe 38 PID 2632 wrote to memory of 2704 2632 WScript.exe 38 PID 2632 wrote to memory of 2704 2632 WScript.exe 38 PID 2632 wrote to memory of 2704 2632 WScript.exe 38 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 2704 wrote to memory of 384 2704 Wrygpxuoiconsoleapp4.exe 40 PID 384 wrote to memory of 1580 384 Wrygpxuoiconsoleapp4.exe 43 PID 384 wrote to memory of 1580 384 Wrygpxuoiconsoleapp4.exe 43 PID 384 wrote to memory of 1580 384 Wrygpxuoiconsoleapp4.exe 43 PID 384 wrote to memory of 1580 384 Wrygpxuoiconsoleapp4.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe"C:\Users\Admin\AppData\Local\Temp\64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Njoarrjqwtkcyedoiyokf.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exe"C:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Cluexwrmdbpntfny.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe"C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exeC:\Users\Admin\AppData\Local\Temp\Wrygpxuoiconsoleapp4.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 7687⤵
- Loads dropped DLL
- Program crash
PID:1580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exeC:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exe4⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exeC:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exe4⤵
- Executes dropped EXE
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exeC:\Users\Admin\AppData\Local\Temp\Gpbwrbwuaconsoleapp17.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exeC:\Users\Admin\AppData\Local\Temp\64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe2⤵
- System Location Discovery: System Language Discovery
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD56b0154ea182640615f31706030f68c68
SHA19ffdfde77609c938a2d34483a9d6066f22bc791b
SHA25678c821ffafd8ccb109314e16cee0e1e4d69d76aaa87aed8e750d15e7816b1043
SHA512a815ae4b298510b91a9a06cab1068f85326394b9b250484376058ae127b2d5e97d31f31a0d85a6848200f71f4565c7a5f2934427abec52bc245198e171634e28
-
Filesize
598KB
MD51597ffd4b1262d1d25f34f0de7aed129
SHA1936fcc97ca39f39aaa05635b95da5a7698785546
SHA256f659031b488c5c105016d60cfc9da09ea0a68f43b957e8b264461e75bcbf6f4b
SHA51229b611766ee35dbf286a71462d845f54897b21c583e24eeb4cbcf5bc387f2468d0ebdb1712f6fc54b3a122d2a1fec122f7c9af7faeda31e6e0625cdff77d9dad
-
Filesize
109B
MD5affb5ef06d9491a7792bb095d79c76de
SHA1fa1f67d95cd8c6e92175a013dd85e249e07f58cd
SHA256ba957adcb69f054612b662976cd85a723a281bac10d7d0df0675386916373900
SHA51275c2b707e7a0afb90a7714516eaba3694b21fe6d036fefcb46c89463e83ee3d8f93769ccefb9498cad5a4911147d91e0d506c2c152dc646a3dcab515bcca7a02
-
Filesize
311KB
MD5960586bdf44ca1fcb8e80cd5846a77b6
SHA150d76e219c07a9dc6d7fd827c9fe9f3ef050cfcb
SHA25692e2cc7980fc342c59860a0e6a16c73f10ee3b0caac53530121e89448933d305
SHA5121e2676c0357d3d1c1177d36816c84c5157956afc2d0ef30aa4fd0ea3aef3150cec31e3a9cdcd31a6d71b8cd2429973e27584e7a9b8003be475c935e31e1a283b