Overview
overview
10Static
static
10de1299d65e...07.exe
windows7-x64
10de1299d65e...07.exe
windows10-2004-x64
10de3206bd13...8d.exe
windows7-x64
8de3206bd13...8d.exe
windows10-2004-x64
8de41dac906...f2.exe
windows7-x64
10de41dac906...f2.exe
windows10-2004-x64
10de55ad6fba...fe.exe
windows7-x64
10de55ad6fba...fe.exe
windows10-2004-x64
10de7c6ded50...6f.exe
windows7-x64
10de7c6ded50...6f.exe
windows10-2004-x64
10de85b03beb...f7.exe
windows7-x64
10de85b03beb...f7.exe
windows10-2004-x64
10de8984199c...45.exe
windows7-x64
10de8984199c...45.exe
windows10-2004-x64
10deb9b3528e...91.exe
windows7-x64
10deb9b3528e...91.exe
windows10-2004-x64
10dec0fc30b5...d0.exe
windows7-x64
10dec0fc30b5...d0.exe
windows10-2004-x64
10ded424937a...b5.exe
windows7-x64
10ded424937a...b5.exe
windows10-2004-x64
10defcdae3dc...64.exe
windows7-x64
10defcdae3dc...64.exe
windows10-2004-x64
10df04d21f8f...1c.exe
windows7-x64
10df04d21f8f...1c.exe
windows10-2004-x64
10df0e554958...e9.exe
windows7-x64
7df0e554958...e9.exe
windows10-2004-x64
7df35e63228...2e.exe
windows7-x64
10df35e63228...2e.exe
windows10-2004-x64
10df43aaf53c...31.exe
windows7-x64
8df43aaf53c...31.exe
windows10-2004-x64
8df9cc0d83f...35.exe
windows7-x64
7df9cc0d83f...35.exe
windows10-2004-x64
7Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win10v2004-20250314-en
General
-
Target
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
-
Size
3.4MB
-
MD5
d48b635ca68d1da2a705d15c9fea449a
-
SHA1
d5fe49c9ce895281d315e27086c0f80890c31b6c
-
SHA256
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d
-
SHA512
259f28179f138d946c1fa52bfac7f276d14a78060fcd33adc67968f3287e8fbb94e93dfb8a560ac9ba472ecf49ef5bf745a1ceb9fcfd3ed8ae279cfc2dc28ed5
-
SSDEEP
98304:XRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/tk69Rx:Xkj8NBFwxpNOuk2qx
Malware Config
Signatures
-
Stops running service(s) 4 TTPs
-
Deletes itself 1 IoCs
pid Process 1676 cxl9A3hzE3SFb.exe -
Executes dropped EXE 2 IoCs
pid Process 1676 cxl9A3hzE3SFb.exe 1180 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe 1180 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3012 sc.exe 2200 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe 1676 cxl9A3hzE3SFb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe Token: SeDebugPrivilege 1676 cxl9A3hzE3SFb.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1676 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe 30 PID 2856 wrote to memory of 1676 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe 30 PID 2856 wrote to memory of 1676 2856 de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe 30 PID 1676 wrote to memory of 2656 1676 cxl9A3hzE3SFb.exe 31 PID 1676 wrote to memory of 2656 1676 cxl9A3hzE3SFb.exe 31 PID 1676 wrote to memory of 2656 1676 cxl9A3hzE3SFb.exe 31 PID 2656 wrote to memory of 3012 2656 cmd.exe 33 PID 2656 wrote to memory of 3012 2656 cmd.exe 33 PID 2656 wrote to memory of 3012 2656 cmd.exe 33 PID 2656 wrote to memory of 2200 2656 cmd.exe 34 PID 2656 wrote to memory of 2200 2656 cmd.exe 34 PID 2656 wrote to memory of 2200 2656 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe"C:\Users\Admin\AppData\Local\Temp\de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\cxl9A3hzE3SFb.exe"C:\Users\Admin\AppData\Local\Temp\cxl9A3hzE3SFb.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGRlMzIwNmJkMTM5MWMyZDZlM2RkYTZjMDMxZGI4ZjgyOThhMmE5N2VjYWQ1NDdhZGIwNmViZTMxZDJkMDBjOGQuZXhl2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\cmd.exe"cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled3⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\sc.exesc stop "SysMain"4⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\system32\sc.exesc config "SysMain" start=disabled4⤵
- Launches sc.exe
PID:2200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD52ecf79b308da07821b09197cc7e7ab1d
SHA12315c4df8b10f161a42680085f8fb4786cc50b69
SHA2563e8a4485864950d5cc0755504262ffa96de29c964000835a7300a9635f7a06dc
SHA512ea40e337fc4c010bf35db04048e56b5fc0364ea37fc9e29c0ad6385b506008b8c53c42b490a03ba69a930a5c6fb0e8aa38198b1d90a224cdedc6b0880851ebe3