Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe

  • Size

    3.4MB

  • MD5

    e44ce2c03e5af2bc482fea32685d3fca

  • SHA1

    c87647db90bb759d7109cd47515fa4921397f1fb

  • SHA256

    488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2

  • SHA512

    764f8fb037f1a529bb54ef2cde8ee91e3afe23c2ed93e8a3796082840cc3524f2c581bd2a22cab9beca975c9442bb7729024b28e0cab7adaf58471f1a736d09e

  • SSDEEP

    98304:TRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/HW:Tkj8NBFwxpNOuk2b

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
    "C:\Users\Admin\AppData\Local\Temp\488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\TK3qbg0H3l.exe
      "C:\Users\Admin\AppData\Local\Temp\TK3qbg0H3l.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDQ4OGFlYzg1ZDQ5MDc1NGJjNDQ1ZjBlMjFlN2Q0ZDUxNDZjNzFkNTAwYmQ5NTNiODEwODYwOGQ0NGUwMzUxYjIuZXhl
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\system32\sc.exe
          sc stop "SysMain"
          4⤵
          • Launches sc.exe
          PID:2992
        • C:\Windows\system32\sc.exe
          sc config "SysMain" start=disabled
          4⤵
          • Launches sc.exe
          PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\TK3qbg0H3l.exe

    Filesize

    3.3MB

    MD5

    92b80ce964d82a95a2ccc91e0c5eff50

    SHA1

    ba6fd79827c00a1d7d842c7bae8c12ae06add496

    SHA256

    5c397f856d827a5361673750ef3849112cec575f8d25e11dc8b498a11b2ef0bf

    SHA512

    b6fcf885ccf69ad9cb1481dff24b4f3a67f7dbec873c79187153f52fb343bade737e749cd33a7205b945b2aea386ac653bb090c1ebb7ad8ad69db8ecae9dfa49

  • memory/2140-6-0x00000000008E0000-0x00000000008E4000-memory.dmp

    Filesize

    16KB

  • memory/2140-9-0x00000000021F0000-0x00000000021F6000-memory.dmp

    Filesize

    24KB

  • memory/2140-3-0x00000000021B0000-0x00000000021E0000-memory.dmp

    Filesize

    192KB

  • memory/2140-4-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2140-5-0x000000001CDC0000-0x000000001D1F8000-memory.dmp

    Filesize

    4.2MB

  • memory/2140-0-0x000007FEF5CC3000-0x000007FEF5CC4000-memory.dmp

    Filesize

    4KB

  • memory/2140-7-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/2140-22-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2140-1-0x000000013F6D0000-0x000000013F9F4000-memory.dmp

    Filesize

    3.1MB

  • memory/2140-10-0x0000000002390000-0x00000000023C2000-memory.dmp

    Filesize

    200KB

  • memory/2140-2-0x000000001BEF0000-0x000000001C1E0000-memory.dmp

    Filesize

    2.9MB

  • memory/2140-11-0x000000001B280000-0x000000001B284000-memory.dmp

    Filesize

    16KB

  • memory/2140-8-0x000000001B6B0000-0x000000001B74C000-memory.dmp

    Filesize

    624KB

  • memory/2600-20-0x000000013FF90000-0x00000001402B4000-memory.dmp

    Filesize

    3.1MB

  • memory/2600-21-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2600-23-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2600-24-0x000000001B810000-0x000000001B882000-memory.dmp

    Filesize

    456KB

  • memory/2600-25-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/2600-27-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2600-26-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2600-29-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2600-30-0x000007FEF5CC0000-0x000007FEF66AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2600-31-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB