Overview
overview
10Static
static
10a6b7e1f8d9...13.exe
windows7-x64
10a6b7e1f8d9...13.exe
windows10-2004-x64
10a6d91e550d...6e.exe
windows7-x64
7a6d91e550d...6e.exe
windows10-2004-x64
7a72cdbd8e2...ad.exe
windows7-x64
10a72cdbd8e2...ad.exe
windows10-2004-x64
10a731427f52...04.exe
windows7-x64
6a731427f52...04.exe
windows10-2004-x64
6a73951d873...67.exe
windows7-x64
10a73951d873...67.exe
windows10-2004-x64
10a74be4d5e7...73.exe
windows7-x64
10a74be4d5e7...73.exe
windows10-2004-x64
10a77ff4e4dd...87.exe
windows7-x64
10a77ff4e4dd...87.exe
windows10-2004-x64
10a799e456ff...88.exe
windows7-x64
10a799e456ff...88.exe
windows10-2004-x64
10a7c49036eb...95.exe
windows7-x64
3a7c49036eb...95.exe
windows10-2004-x64
3a7d8553ba6...a8.exe
windows7-x64
7a7d8553ba6...a8.exe
windows10-2004-x64
7a7e953c880...28.exe
windows7-x64
10a7e953c880...28.exe
windows10-2004-x64
10a7ead69ceb...a3.exe
windows7-x64
9a7ead69ceb...a3.exe
windows10-2004-x64
9a7ec6d64b2...db.exe
windows7-x64
1a7ec6d64b2...db.exe
windows10-2004-x64
1a7fd5ae1f0...f8.exe
windows7-x64
10a7fd5ae1f0...f8.exe
windows10-2004-x64
10a884e586e0...e0.exe
windows7-x64
10a884e586e0...e0.exe
windows10-2004-x64
10a8b0399c70...33.exe
windows7-x64
10a8b0399c70...33.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win10v2004-20250314-en
General
-
Target
a74be4d5e7b154091b38338a6ac94973.exe
-
Size
811KB
-
MD5
a74be4d5e7b154091b38338a6ac94973
-
SHA1
869b7342f2354a84a88e333f51bc5ee86dc5c66e
-
SHA256
9c089fbaa60a508b50525205890e389f797919b231e90b8a3d02120e9776be08
-
SHA512
906a1078d28d52bd3cd5c0b77164a7da6bad7a34f316ff980dee887f4b4561760d128c85f226099c86029f628543044e3dfd442066e2ad5c0828eeb548f66b9d
-
SSDEEP
6144:/tT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3rcnKg:p6u7+487IFjvelQypyfy7cnKg
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2620 app.exe 2684 app.exe 632 My.RawFile.exe -
Loads dropped DLL 3 IoCs
pid Process 236 a74be4d5e7b154091b38338a6ac94973.exe 2620 app.exe 2620 app.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" a74be4d5e7b154091b38338a6ac94973.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2620 set thread context of 3016 2620 app.exe 34 PID 2620 set thread context of 1248 2620 app.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language My.RawFile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a74be4d5e7b154091b38338a6ac94973.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 236 a74be4d5e7b154091b38338a6ac94973.exe 236 a74be4d5e7b154091b38338a6ac94973.exe 236 a74be4d5e7b154091b38338a6ac94973.exe 236 a74be4d5e7b154091b38338a6ac94973.exe 236 a74be4d5e7b154091b38338a6ac94973.exe 236 a74be4d5e7b154091b38338a6ac94973.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2684 app.exe 2684 app.exe 2684 app.exe 2684 app.exe 2684 app.exe 2684 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 632 My.RawFile.exe 632 My.RawFile.exe 632 My.RawFile.exe 632 My.RawFile.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe 2620 app.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 236 a74be4d5e7b154091b38338a6ac94973.exe Token: SeDebugPrivilege 2620 app.exe Token: SeDebugPrivilege 2684 app.exe Token: SeDebugPrivilege 632 My.RawFile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 632 My.RawFile.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 236 wrote to memory of 2620 236 a74be4d5e7b154091b38338a6ac94973.exe 31 PID 236 wrote to memory of 2620 236 a74be4d5e7b154091b38338a6ac94973.exe 31 PID 236 wrote to memory of 2620 236 a74be4d5e7b154091b38338a6ac94973.exe 31 PID 236 wrote to memory of 2620 236 a74be4d5e7b154091b38338a6ac94973.exe 31 PID 2620 wrote to memory of 2684 2620 app.exe 32 PID 2620 wrote to memory of 2684 2620 app.exe 32 PID 2620 wrote to memory of 2684 2620 app.exe 32 PID 2620 wrote to memory of 2684 2620 app.exe 32 PID 2620 wrote to memory of 632 2620 app.exe 33 PID 2620 wrote to memory of 632 2620 app.exe 33 PID 2620 wrote to memory of 632 2620 app.exe 33 PID 2620 wrote to memory of 632 2620 app.exe 33 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 3016 2620 app.exe 34 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 PID 2620 wrote to memory of 1248 2620 app.exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 My.RawFile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a74be4d5e7b154091b38338a6ac94973.exe"C:\Users\Admin\AppData\Local\Temp\a74be4d5e7b154091b38338a6ac94973.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\My.RawFile.exe"C:\Users\Admin\AppData\Roaming\My.RawFile.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:632
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
817KB
MD5fbe3d646a16edf7b1d1fb4e8e2620b19
SHA18019b8f81f5fc2a3a9b6907bf07a3a6bb48c5a12
SHA256c08fddfcaf474c87855f13a115de98941f05b14fcf36e2a0e12446877bce721c
SHA5124c288ff9721838563cc77ed3781490a80149441af173db81c6b509ca6de5ba88710c5895f1306dcce3ed028a7e0bb30f45153ce70e75e58eb296a8bd507fff55
-
Filesize
142KB
MD55a733ef0de5e31e2e4b4abb016c0f251
SHA128644040a6deac35c20fa931b5d003a97293363e
SHA256a80c77ca694eca3f6629c54572aba811e64b61975c5db2ff38c8d662d12b1ce7
SHA5129d09ac6b6a560643cac08345ab6ef8578011b11be7d4821d7aa1b3d76f2801d30cb4d206a4ff9335f0ece5cfa2ec8258754b2481102eac3da064e5005f7ffba9