Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
General
-
Target
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
-
Size
3.2MB
-
MD5
7494010a358747ff81d28f600257398c
-
SHA1
2e23901e568bc0c51f9c8da9a193c52c0b9b6be8
-
SHA256
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591
-
SHA512
be92074b60041dd130f13f548cf5d004605efd9aae0a4f362b5c40060b740ff97b5f531d0648e73e30a63cc611ff007d6a091fed301092485d886ad67eaddcfb
-
SSDEEP
98304:nRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/d:nkj8NBFwxpNOuk2I
Malware Config
Signatures
-
Stops running service(s) 4 TTPs
-
Deletes itself 1 IoCs
pid Process 2712 23Am3X4pF3.exe -
Executes dropped EXE 2 IoCs
pid Process 2712 23Am3X4pF3.exe 1236 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 1236 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1148 sc.exe 1076 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe 2712 23Am3X4pF3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe Token: SeDebugPrivilege 2712 23Am3X4pF3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2712 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 30 PID 2236 wrote to memory of 2712 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 30 PID 2236 wrote to memory of 2712 2236 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 30 PID 2712 wrote to memory of 2852 2712 23Am3X4pF3.exe 31 PID 2712 wrote to memory of 2852 2712 23Am3X4pF3.exe 31 PID 2712 wrote to memory of 2852 2712 23Am3X4pF3.exe 31 PID 2852 wrote to memory of 1148 2852 cmd.exe 33 PID 2852 wrote to memory of 1148 2852 cmd.exe 33 PID 2852 wrote to memory of 1148 2852 cmd.exe 33 PID 2852 wrote to memory of 1076 2852 cmd.exe 34 PID 2852 wrote to memory of 1076 2852 cmd.exe 34 PID 2852 wrote to memory of 1076 2852 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe"C:\Users\Admin\AppData\Local\Temp\fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\23Am3X4pF3.exe"C:\Users\Admin\AppData\Local\Temp\23Am3X4pF3.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGZlZjJiODMxZTVkN2E5MjFhMWZjZTExYmMxODI3Yjg3MjUwYmJjYTc1NTI5NDZhMTQ0NDRjMzVkYmM0ZTE1OTEuZXhl2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\cmd.exe"cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\sc.exesc stop "SysMain"4⤵
- Launches sc.exe
PID:1148
-
-
C:\Windows\system32\sc.exesc config "SysMain" start=disabled4⤵
- Launches sc.exe
PID:1076
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ce87f602a5ca08200b394a7149073fb9
SHA18031043d083b78243557c9fd96528f106df2f153
SHA25631df32379700db50a97adaae6ed9ecc89050bb43cebbc16e8f36745176767cf6
SHA512434ef8cb8b81aa05b68be6a3b1642f60eb1801bdd782a41cb88a6b72ad9dbb83985ef079eac0189c05ece93d0d1fb5f288d48924fbe3e79de3f4ed24e34a9ec1