Resubmissions
05/03/2025, 21:07
250305-zydp2sywbw 716/11/2022, 10:41
221116-mq9fjaeb31 807/09/2020, 18:51
200907-pl7ygfpqxs 7Analysis
-
max time kernel
30s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe
Resource
win10v2004-20250217-en
General
-
Target
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe
-
Size
76KB
-
MD5
a4782bbfe7300e51e2e3f962fe9ea33f
-
SHA1
9b5facdba4a5dc8395874e3fd91b983048157f28
-
SHA256
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35
-
SHA512
544a15f6039d1cac735f15d9c1a6504e8ac9836b2c5fa02f2620ed570bbe98c87950d389928927c0fa42b6c3223709db52af869ba491930370cd9757538d66d9
-
SSDEEP
1536:ODuTzBQ+4UowCcI8UYJxs+j4mTRBIFe+5rttOmq:EuTzBSUgcI83dj4UIFektOm
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinWord64 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe\" " d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2825171-FA05-11EF-8A02-DE8CFA0D7791} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2236 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2860 2296 iexplore.exe 38 PID 2296 wrote to memory of 2860 2296 iexplore.exe 38 PID 2296 wrote to memory of 2860 2296 iexplore.exe 38 PID 2296 wrote to memory of 2860 2296 iexplore.exe 38 PID 2860 wrote to memory of 2948 2860 IEXPLORE.EXE 39 PID 2860 wrote to memory of 2948 2860 IEXPLORE.EXE 39 PID 2860 wrote to memory of 2948 2860 IEXPLORE.EXE 39 PID 2860 wrote to memory of 2948 2860 IEXPLORE.EXE 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe"C:\Users\Admin\AppData\Local\Temp\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1684
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1616
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\FormatResume.odt"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2236
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD562119c2f2c3abde8b7440b26d1e543e3
SHA1cb68acadba431eb9a66dc4153c34444e87106111
SHA256c3209a46aee7ed3ba6f8faf514e92304a8b5152c81e21515df267afeea6e3f41
SHA5127f6ae01a4a8787b155d4546b9fefde653c71073851458495fc5500b425ec58982f4d24a04083c85b0cf9a604e39d1043c379753e719beeb411814e056955760c