Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
Server.exe
Resource
win7-20240903-en
General
-
Target
Server.exe
-
Size
378KB
-
MD5
2259d80782439b55d0d44eb0a2b39a24
-
SHA1
a072494a995cdeeed9c38a8e4f0e9e02167283b9
-
SHA256
0b52cb6c4cda4706e62dd403e58626a911019c557b6a30cb1ec3fea27cc4a131
-
SHA512
12caff1c80f5a2291b3bd0b1e37c742cf24606093b82399bfaf71353b662a280cafee1acfb542890230d824bda29fe25600d3dc5795e7a3bf4c65b642adc9e70
-
SSDEEP
3072:bHxJqtiEbBIn6VVGxFYdCLYMywMKvIl3wpjM9jtXrMs5CH3ulOmT2oYZAsnGTW81:Mjjw3vIlGqtbMuCHZLyFa8H
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" Server.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Server.exe File opened (read-only) \??\U: Server.exe File opened (read-only) \??\G: Server.exe File opened (read-only) \??\K: Server.exe File opened (read-only) \??\N: Server.exe File opened (read-only) \??\Q: Server.exe File opened (read-only) \??\R: Server.exe File opened (read-only) \??\V: Server.exe File opened (read-only) \??\Y: Server.exe File opened (read-only) \??\Z: Server.exe File opened (read-only) \??\I: Server.exe File opened (read-only) \??\L: Server.exe File opened (read-only) \??\O: Server.exe File opened (read-only) \??\S: Server.exe File opened (read-only) \??\W: Server.exe File opened (read-only) \??\J: Server.exe File opened (read-only) \??\M: Server.exe File opened (read-only) \??\T: Server.exe File opened (read-only) \??\X: Server.exe File opened (read-only) \??\E: Server.exe File opened (read-only) \??\H: Server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe Server.exe File opened for modification C:\Windows\SysWOW64\runouce.exe Server.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Server.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsColorChart.html Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\readme.eml Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.HTM Server.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Server.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Soft Blue.htm Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsBrowserUpgrade.html Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm Server.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Server.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml Server.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Server.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Server.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Server.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.htm Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsBlankPage.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewTemplate.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html Server.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\readme.eml Server.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPrintTemplate.html Server.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Server.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Server.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html Server.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePage.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.HTM Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.HTM Server.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Shades of Blue.htm Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Server.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm Server.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Server.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Server.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Server.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\readme.eml Server.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html Server.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewTemplate.html Server.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2240 2664 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2664 2648 Server.exe 30 PID 2648 wrote to memory of 2664 2648 Server.exe 30 PID 2648 wrote to memory of 2664 2648 Server.exe 30 PID 2648 wrote to memory of 2664 2648 Server.exe 30 PID 2664 wrote to memory of 2240 2664 Server.exe 31 PID 2664 wrote to memory of 2240 2664 Server.exe 31 PID 2664 wrote to memory of 2240 2664 Server.exe 31 PID 2664 wrote to memory of 2240 2664 Server.exe 31 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21 PID 2648 wrote to memory of 1188 2648 Server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 1684⤵
- Program crash
PID:2240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5f1deb2d0ecaeca8a56a4dedd3c7e5c7b
SHA1cd5ee4c7490703d6e2f26aa23bc65b073326c80d
SHA2561ecfc6bf3eb243122612ca52bd394e19c3df34dc47bc96fa8e7fbe0eab557aaf
SHA512c0f4098b18443e710d42564e6376812ba59617603840d88a0ad59d5884ef12a7ca0f0da05b56cd211e3d655040f217d156722831286da4c55c599080d2899e8d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD58156706568e77846b7bfbcc091c6ffeb
SHA1792aa0db64f517520ee8f745bee71152532fe4d2
SHA2565e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8
SHA5128760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize8KB
MD57757fe48a0974cb625e89012c92cc995
SHA1e4684021f14053c3f9526070dc687ff125251162
SHA256c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03
SHA512b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526
-
Filesize
451KB
MD5e6f7331a9f3b04bfa3a633873e69c944
SHA1bb09f026b6da47abc2ae4a53f5ce6b2b0827acaf
SHA256a88c7e6f23fd8e5f334c806caf31e524883dad8e05a1cf7fb33fe880c8d4c6f8
SHA5127081e47b5e1a707e8abb9cd4d50759d404aa9aba6819b362395ffad70499d1adfbdeb5f78a4db330fd1558dda52d82c03287308bb4af9ca65d9deb0ad3f63d10
-
Filesize
640KB
MD5f7e9b74673064141e8d76a9331de5b6a
SHA142b3276df5a7b044005e55f3a9f05031e0c66b9b
SHA25688dbb38d4642d4402cae2c6bdc28bb1668f20a5b6a9b07a33628506f5a040b5c
SHA51283c11a15ab3d6ed5ba42bcbefc8a7077fd69f65b7057d6f209202a79bdc1468620ae6ef09da3bb8fff07907fd0ad9ec9cee5de91a7e2c04a9c38b5fe2194a280
-
Filesize
640KB
MD53835c6cf403e6ea0926576fe83cf7f6f
SHA1b9fcbc8f01230d9261249988616a89baac05d521
SHA256420f641999a0a6abed154d2b409044da6a65bfd5fc4276dc865a0989f00c855c
SHA512c5a02558a327b3066c1ac936a9d256465e4270bcca66984e8596715a52b36e40d836885affbe7cd6751476d44c8b344ce124391313475c35423eb4381413db97
-
Filesize
461KB
MD5a08860120648a74b2dbcf3d9229cbd5c
SHA1bdd4fd885a38fa868f8adf8d0abf1c37061e3d4a
SHA25685298502b9bdd9ae5cf94efacfe3eaaba6375c7271ef99260786a0d8d09e56cb
SHA5129687c0b3447fce8438b1a7d6bd38b611776face6efca3039a9a028c2faf7b312ff44551e4fba541941e040b3756961e448a7863d43f6bd3777dc790a4266c489
-
Filesize
451KB
MD56a0d501dcda205b7c0561cb22d557ad3
SHA10646b041939a8d246f6eceadda8f77aa4c383718
SHA256e99ee064e1e9dc795468e0929bd20f80b3eb34305d1ed54cd877c08a85bfc061
SHA512da79112c9f836bcd33871eee2954e9f91a504f670bdd0113087f72c82a94adc784ab6df9d56438fd59a9599b2a65297c43a1f175d04e7b1efe2dfbf9ed9905f7
-
Filesize
461KB
MD5955491c844110a89a4bc904f20b8f529
SHA1843375f351956cce356bc9431e07406566a0f4b8
SHA256e17be9555ff62dc9f3644ba7d3bc7e8ba46c6e4b1a46a99292437f375bc022d2
SHA51260f4977947d462dc05fbc2d670010d654cc02c28c4bf9f0707ef1145c2b68c958aa72e79a7a324ab8be3da71752679b029502750f06241b432c72e39fa52c06b
-
Filesize
152KB
MD5e86c5b45d7f852b26b4c9d5db81677df
SHA119ab6d88b2db6a5a510707b54f4e71158cfc169a
SHA256c70668b33ecc39328a8cf78a4a98f957c1cb5155737834d7e6032afceb6fbd1f
SHA5128c6263fc9de9f609820339aa3b25a6715676290699d718b9dedaf3823121a635b98bef885b6be3650b385900a9fc190afaac0472ac4f281dade58d50c5c9a03f
-
Filesize
10KB
MD595aa88c2bbc411d97f020fc76d6c15d0
SHA15ce8458e1a60500eed8695a852e66eb27f3518c5
SHA256703c523b89449516cf0846109d35a236783b00c7f3d14345b2493609feac90c7
SHA512210ec0ce983a6802958d299208636830ea943e28a2dc879237a735f09f3e6038dcad9dba94282d0287a85166ed1a056774025d06f853ad98db6f3acc6387adb7
-
Filesize
80KB
MD57e91a619a63b5895b1c95ae363f0ca78
SHA1d995458ba7c8a23549bf7e32a83caaf66b3df7be
SHA256b6817107cc0b34eab10162deb3c6fa1185ddcefc0e8233c58d2947c0f81ebf18
SHA51256d5d5dcfe8641759d702b920c8bc0bef8f75e131b2d0d7fb3f53d57df1ead08a692afc89f39964b152de3f2294f5273370b7d80061ef95607085f9598e34850