Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 04:56

General

  • Target

    Server.exe

  • Size

    378KB

  • MD5

    2259d80782439b55d0d44eb0a2b39a24

  • SHA1

    a072494a995cdeeed9c38a8e4f0e9e02167283b9

  • SHA256

    0b52cb6c4cda4706e62dd403e58626a911019c557b6a30cb1ec3fea27cc4a131

  • SHA512

    12caff1c80f5a2291b3bd0b1e37c742cf24606093b82399bfaf71353b662a280cafee1acfb542890230d824bda29fe25600d3dc5795e7a3bf4c65b642adc9e70

  • SSDEEP

    3072:bHxJqtiEbBIn6VVGxFYdCLYMywMKvIl3wpjM9jtXrMs5CH3ulOmT2oYZAsnGTW81:Mjjw3vIlGqtbMuCHZLyFa8H

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\Server.exe
        "C:\Users\Admin\AppData\Local\Temp\Server.exe"
        2⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Users\Admin\AppData\Local\Temp\Server.exe
          "C:\Users\Admin\AppData\Local\Temp\Server.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 168
            4⤵
            • Program crash
            PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Java\jdk1.7.0_80\jre\readme.eml

      Filesize

      14KB

      MD5

      f1deb2d0ecaeca8a56a4dedd3c7e5c7b

      SHA1

      cd5ee4c7490703d6e2f26aa23bc65b073326c80d

      SHA256

      1ecfc6bf3eb243122612ca52bd394e19c3df34dc47bc96fa8e7fbe0eab557aaf

      SHA512

      c0f4098b18443e710d42564e6376812ba59617603840d88a0ad59d5884ef12a7ca0f0da05b56cd211e3d655040f217d156722831286da4c55c599080d2899e8d

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

      Filesize

      12KB

      MD5

      8156706568e77846b7bfbcc091c6ffeb

      SHA1

      792aa0db64f517520ee8f745bee71152532fe4d2

      SHA256

      5e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8

      SHA512

      8760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

      Filesize

      8KB

      MD5

      7757fe48a0974cb625e89012c92cc995

      SHA1

      e4684021f14053c3f9526070dc687ff125251162

      SHA256

      c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03

      SHA512

      b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526

    • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe

      Filesize

      451KB

      MD5

      e6f7331a9f3b04bfa3a633873e69c944

      SHA1

      bb09f026b6da47abc2ae4a53f5ce6b2b0827acaf

      SHA256

      a88c7e6f23fd8e5f334c806caf31e524883dad8e05a1cf7fb33fe880c8d4c6f8

      SHA512

      7081e47b5e1a707e8abb9cd4d50759d404aa9aba6819b362395ffad70499d1adfbdeb5f78a4db330fd1558dda52d82c03287308bb4af9ca65d9deb0ad3f63d10

    • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

      Filesize

      640KB

      MD5

      f7e9b74673064141e8d76a9331de5b6a

      SHA1

      42b3276df5a7b044005e55f3a9f05031e0c66b9b

      SHA256

      88dbb38d4642d4402cae2c6bdc28bb1668f20a5b6a9b07a33628506f5a040b5c

      SHA512

      83c11a15ab3d6ed5ba42bcbefc8a7077fd69f65b7057d6f209202a79bdc1468620ae6ef09da3bb8fff07907fd0ad9ec9cee5de91a7e2c04a9c38b5fe2194a280

    • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

      Filesize

      640KB

      MD5

      3835c6cf403e6ea0926576fe83cf7f6f

      SHA1

      b9fcbc8f01230d9261249988616a89baac05d521

      SHA256

      420f641999a0a6abed154d2b409044da6a65bfd5fc4276dc865a0989f00c855c

      SHA512

      c5a02558a327b3066c1ac936a9d256465e4270bcca66984e8596715a52b36e40d836885affbe7cd6751476d44c8b344ce124391313475c35423eb4381413db97

    • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

      Filesize

      461KB

      MD5

      a08860120648a74b2dbcf3d9229cbd5c

      SHA1

      bdd4fd885a38fa868f8adf8d0abf1c37061e3d4a

      SHA256

      85298502b9bdd9ae5cf94efacfe3eaaba6375c7271ef99260786a0d8d09e56cb

      SHA512

      9687c0b3447fce8438b1a7d6bd38b611776face6efca3039a9a028c2faf7b312ff44551e4fba541941e040b3756961e448a7863d43f6bd3777dc790a4266c489

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      451KB

      MD5

      6a0d501dcda205b7c0561cb22d557ad3

      SHA1

      0646b041939a8d246f6eceadda8f77aa4c383718

      SHA256

      e99ee064e1e9dc795468e0929bd20f80b3eb34305d1ed54cd877c08a85bfc061

      SHA512

      da79112c9f836bcd33871eee2954e9f91a504f670bdd0113087f72c82a94adc784ab6df9d56438fd59a9599b2a65297c43a1f175d04e7b1efe2dfbf9ed9905f7

    • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe

      Filesize

      461KB

      MD5

      955491c844110a89a4bc904f20b8f529

      SHA1

      843375f351956cce356bc9431e07406566a0f4b8

      SHA256

      e17be9555ff62dc9f3644ba7d3bc7e8ba46c6e4b1a46a99292437f375bc022d2

      SHA512

      60f4977947d462dc05fbc2d670010d654cc02c28c4bf9f0707ef1145c2b68c958aa72e79a7a324ab8be3da71752679b029502750f06241b432c72e39fa52c06b

    • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

      Filesize

      152KB

      MD5

      e86c5b45d7f852b26b4c9d5db81677df

      SHA1

      19ab6d88b2db6a5a510707b54f4e71158cfc169a

      SHA256

      c70668b33ecc39328a8cf78a4a98f957c1cb5155737834d7e6032afceb6fbd1f

      SHA512

      8c6263fc9de9f609820339aa3b25a6715676290699d718b9dedaf3823121a635b98bef885b6be3650b385900a9fc190afaac0472ac4f281dade58d50c5c9a03f

    • C:\Windows\SysWOW64\runouce.exe

      Filesize

      10KB

      MD5

      95aa88c2bbc411d97f020fc76d6c15d0

      SHA1

      5ce8458e1a60500eed8695a852e66eb27f3518c5

      SHA256

      703c523b89449516cf0846109d35a236783b00c7f3d14345b2493609feac90c7

      SHA512

      210ec0ce983a6802958d299208636830ea943e28a2dc879237a735f09f3e6038dcad9dba94282d0287a85166ed1a056774025d06f853ad98db6f3acc6387adb7

    • C:\vcredist2010_x86.log.html

      Filesize

      80KB

      MD5

      7e91a619a63b5895b1c95ae363f0ca78

      SHA1

      d995458ba7c8a23549bf7e32a83caaf66b3df7be

      SHA256

      b6817107cc0b34eab10162deb3c6fa1185ddcefc0e8233c58d2947c0f81ebf18

      SHA512

      56d5d5dcfe8641759d702b920c8bc0bef8f75e131b2d0d7fb3f53d57df1ead08a692afc89f39964b152de3f2294f5273370b7d80061ef95607085f9598e34850

    • memory/1188-4-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/1188-3-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/2648-0-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2648-1046-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB

    • memory/2648-1049-0x0000000000460000-0x00000000004BF000-memory.dmp

      Filesize

      380KB

    • memory/2664-1-0x0000000000400000-0x000000000045F000-memory.dmp

      Filesize

      380KB