Overview
overview
10Static
static
10fa9684b8aa...f5.exe
windows7-x64
10fa9684b8aa...f5.exe
windows10-2004-x64
10fab34117f7...aa.exe
windows7-x64
8fab34117f7...aa.exe
windows10-2004-x64
8fab48bce34...b4.exe
windows7-x64
10fab48bce34...b4.exe
windows10-2004-x64
10fab98623ff...4d.exe
windows7-x64
7fab98623ff...4d.exe
windows10-2004-x64
10fac2d1b39c...1b.exe
windows7-x64
1fac2d1b39c...1b.exe
windows10-2004-x64
1fafdd4e185...1c.exe
windows7-x64
10fafdd4e185...1c.exe
windows10-2004-x64
10fb29a0de04...ad.exe
windows7-x64
10fb29a0de04...ad.exe
windows10-2004-x64
10fba3c6ae20...e7.exe
windows7-x64
10fba3c6ae20...e7.exe
windows10-2004-x64
10fba6f3a4d4...b5.exe
windows7-x64
7fba6f3a4d4...b5.exe
windows10-2004-x64
7fbcf00ed27...c6.exe
windows7-x64
8fbcf00ed27...c6.exe
windows10-2004-x64
8fbd98903f8...bc.exe
windows7-x64
8fbd98903f8...bc.exe
windows10-2004-x64
8fc0103e816...3d.exe
windows7-x64
10fc0103e816...3d.exe
windows10-2004-x64
10fc3b729bc6...f7.exe
windows7-x64
7fc3b729bc6...f7.exe
windows10-2004-x64
7fc6ef4e0d5...7d.exe
windows7-x64
10fc6ef4e0d5...7d.exe
windows10-2004-x64
10fc79307cdb...f3.exe
windows7-x64
10fc79307cdb...f3.exe
windows10-2004-x64
10fc89267e95...ad.exe
windows7-x64
1fc89267e95...ad.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fa9684b8aa290d6ff1b647323a6d35f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa9684b8aa290d6ff1b647323a6d35f5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
fab34117f7b728cbe6b6a07d7ff129aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fab34117f7b728cbe6b6a07d7ff129aa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fab48bce3470fcdc7b77131b73cd9db4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
fab48bce3470fcdc7b77131b73cd9db4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fab98623ff825ef3c56bf150ac25d34d.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
fab98623ff825ef3c56bf150ac25d34d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fac2d1b39cd0231d245b4d4271a32dae40a51d5ac6091f83cf645af3d83e571b.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
fac2d1b39cd0231d245b4d4271a32dae40a51d5ac6091f83cf645af3d83e571b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fafdd4e18554dbe82fc6f522d5bbd4a32162ce3e9dc0a11ccc5b91d6767a841c.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
fafdd4e18554dbe82fc6f522d5bbd4a32162ce3e9dc0a11ccc5b91d6767a841c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
fb29a0de0487b94558425bddaebcd35bc23178df4dfd02764d210ac340aecbad.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
fb29a0de0487b94558425bddaebcd35bc23178df4dfd02764d210ac340aecbad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fba3c6ae202184e540a331393c5f16e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fba3c6ae202184e540a331393c5f16e7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
fba6f3a4d4330513edec704de64fa9b5.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
fba6f3a4d4330513edec704de64fa9b5.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
fbcf00ed27bac15c981d237c31af77c6.exe
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
fbcf00ed27bac15c981d237c31af77c6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
fbd98903f85840f90b218843df6be111339b24f98ff354743d374c8a359ca6bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
fc0103e816984d1e97626e76a8d18d3d.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
fc0103e816984d1e97626e76a8d18d3d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
fc3b729bc6897f8c971ac81084f74f2ea976b7854afae826afefb1a34629bbf7.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
fc3b729bc6897f8c971ac81084f74f2ea976b7854afae826afefb1a34629bbf7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
fc6ef4e0d5a7d150903c47cf60fa3ea21d7f0cdf7d0eeadff0cd910bdced0e7d.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
fc6ef4e0d5a7d150903c47cf60fa3ea21d7f0cdf7d0eeadff0cd910bdced0e7d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
fc79307cdb028b94519033c54ade814fe381ebb17c66a81aa6624a7c6db9a5f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
fc79307cdb028b94519033c54ade814fe381ebb17c66a81aa6624a7c6db9a5f3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fc89267e95fb4313863bc6e01cb80dad.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
fc89267e95fb4313863bc6e01cb80dad.exe
Resource
win10v2004-20250314-en
General
-
Target
fba3c6ae202184e540a331393c5f16e7.exe
-
Size
1.0MB
-
MD5
fba3c6ae202184e540a331393c5f16e7
-
SHA1
3a62fab7a75b9f09618973d3fd02baef3d3eddd6
-
SHA256
e739161dae14c84de4d442a5bb824831c682ecaab8620d01f4123d4609053864
-
SHA512
9b60e1993ab64f1c69aedbbf6f94bbdd2f310fe12b91d9adc92de035e6bb14d229cb93e0db1f8b05fa20b91f30a28dcc4b2d5726ed1392939a4f5bee562bdd86
-
SSDEEP
12288:lz7IFjvelQypyfy7z6u7+4DvbMUsIGoHut2W:lz0FfMz6TEbMUskH0
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2204 app.exe 528 app.exe 3028 My.RawFile.exe -
Loads dropped DLL 3 IoCs
pid Process 3008 fba3c6ae202184e540a331393c5f16e7.exe 2204 app.exe 2204 app.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" fba3c6ae202184e540a331393c5f16e7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2204 set thread context of 2868 2204 app.exe 33 PID 2204 set thread context of 2872 2204 app.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fba3c6ae202184e540a331393c5f16e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language My.RawFile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 fba3c6ae202184e540a331393c5f16e7.exe 3008 fba3c6ae202184e540a331393c5f16e7.exe 3008 fba3c6ae202184e540a331393c5f16e7.exe 3008 fba3c6ae202184e540a331393c5f16e7.exe 3008 fba3c6ae202184e540a331393c5f16e7.exe 3008 fba3c6ae202184e540a331393c5f16e7.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 528 app.exe 528 app.exe 528 app.exe 528 app.exe 528 app.exe 528 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 3028 My.RawFile.exe 3028 My.RawFile.exe 3028 My.RawFile.exe 3028 My.RawFile.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe 2204 app.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3008 fba3c6ae202184e540a331393c5f16e7.exe Token: SeDebugPrivilege 2204 app.exe Token: SeDebugPrivilege 528 app.exe Token: SeDebugPrivilege 3028 My.RawFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3028 My.RawFile.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2204 3008 fba3c6ae202184e540a331393c5f16e7.exe 30 PID 3008 wrote to memory of 2204 3008 fba3c6ae202184e540a331393c5f16e7.exe 30 PID 3008 wrote to memory of 2204 3008 fba3c6ae202184e540a331393c5f16e7.exe 30 PID 3008 wrote to memory of 2204 3008 fba3c6ae202184e540a331393c5f16e7.exe 30 PID 2204 wrote to memory of 528 2204 app.exe 31 PID 2204 wrote to memory of 528 2204 app.exe 31 PID 2204 wrote to memory of 528 2204 app.exe 31 PID 2204 wrote to memory of 528 2204 app.exe 31 PID 2204 wrote to memory of 3028 2204 app.exe 32 PID 2204 wrote to memory of 3028 2204 app.exe 32 PID 2204 wrote to memory of 3028 2204 app.exe 32 PID 2204 wrote to memory of 3028 2204 app.exe 32 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2868 2204 app.exe 33 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 PID 2204 wrote to memory of 2872 2204 app.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba3c6ae202184e540a331393c5f16e7.exe"C:\Users\Admin\AppData\Local\Temp\fba3c6ae202184e540a331393c5f16e7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Roaming\My.RawFile.exe"C:\Users\Admin\AppData\Roaming\My.RawFile.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3028
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079662c822c76866ddbfa1d2c6268104
SHA15c92b70fd3f6dab24f80c648e778a5e47b290822
SHA256d586d07acc9340907b9e39f744778fbfebb5adeac329762e44b0c268f53e6d26
SHA5125415c10a761bdc071d1d39216929feb2cce5294cbeabbcaa1611109e4779fa180d1a7f2636d662389883c31993f6bd3884cfe03594fdd161d8806130c6110fe1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
142KB
MD55a733ef0de5e31e2e4b4abb016c0f251
SHA128644040a6deac35c20fa931b5d003a97293363e
SHA256a80c77ca694eca3f6629c54572aba811e64b61975c5db2ff38c8d662d12b1ce7
SHA5129d09ac6b6a560643cac08345ab6ef8578011b11be7d4821d7aa1b3d76f2801d30cb4d206a4ff9335f0ece5cfa2ec8258754b2481102eac3da064e5005f7ffba9
-
Filesize
1.0MB
MD5ab133905d77f6d2962c389883e36282b
SHA1c8fffea9984f0b7bac6a5de6cdb538f4ea82d46c
SHA2567d34b7f40d057dc8b0a1e105ac8dc9ce64db69096757fcc194f96ae5607ae3b1
SHA512e88c43dbff217375c431766e3e798adaa22c0aa2b329d98247aa51c27ed747c13f1feb46f105ba21ac3bdbf359e2b4d69363b881bbdd9ba70f7cb379e735c0ed