Analysis
-
max time kernel
127s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 07:09
Behavioral task
behavioral1
Sample
9ccfdd44ee5fede8d813441081c37054.exe
Resource
win10v2004-20250314-en
General
-
Target
9ccfdd44ee5fede8d813441081c37054.exe
-
Size
1.2MB
-
MD5
9ccfdd44ee5fede8d813441081c37054
-
SHA1
645baedccb045294e5e00e8632316c8d0e349bdc
-
SHA256
da4d4bdb72382261383f2b08e86cb670a2ca99acef22c5866187371ec537ba91
-
SHA512
79f68ee36c42d4d68af62e42cf5c9b7d420c18d7bdca09fb7d40784cf3b95caed41798b47b04e783fdbdff169046ea1bca329ca876a97a663116f385b0271344
-
SSDEEP
24576:tHjTwpzGkqDZBI6JNwsqG5nDCsGf5Qa9u+aasbWgxU:RjTwpzGLq6JPDCsGh2r
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 3 4640 9ccfdd44ee5fede8d813441081c37054.exe 3 4640 9ccfdd44ee5fede8d813441081c37054.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 9ccfdd44ee5fede8d813441081c37054.exe -
Executes dropped EXE 4 IoCs
pid Process 3172 temp_23646.exe 5752 temp_23646.exe 2856 winserv.exe 4280 temp_23650.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Local\\Temp\\temp_23646.exe" temp_23646.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Roaming\\Winserv\\winserv.exe" temp_23646.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp_23646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp_23646.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe 4640 9ccfdd44ee5fede8d813441081c37054.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4640 wrote to memory of 3172 4640 9ccfdd44ee5fede8d813441081c37054.exe 93 PID 4640 wrote to memory of 3172 4640 9ccfdd44ee5fede8d813441081c37054.exe 93 PID 4640 wrote to memory of 3172 4640 9ccfdd44ee5fede8d813441081c37054.exe 93 PID 3612 wrote to memory of 5752 3612 cmd.exe 98 PID 3612 wrote to memory of 5752 3612 cmd.exe 98 PID 3612 wrote to memory of 5752 3612 cmd.exe 98 PID 5312 wrote to memory of 2856 5312 cmd.exe 99 PID 5312 wrote to memory of 2856 5312 cmd.exe 99 PID 5312 wrote to memory of 2856 5312 cmd.exe 99 PID 4640 wrote to memory of 4280 4640 9ccfdd44ee5fede8d813441081c37054.exe 100 PID 4640 wrote to memory of 4280 4640 9ccfdd44ee5fede8d813441081c37054.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ccfdd44ee5fede8d813441081c37054.exe"C:\Users\Admin\AppData\Local\Temp\9ccfdd44ee5fede8d813441081c37054.exe"1⤵
- Downloads MZ/PE file
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\temp_23646.exe"C:\Users\Admin\AppData\Local\Temp\temp_23646.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\temp_23650.exe"C:\Users\Admin\AppData\Local\Temp\temp_23650.exe"2⤵
- Executes dropped EXE
PID:4280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp_23646.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\temp_23646.exeC:\Users\Admin\AppData\Local\Temp\temp_23646.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Winserv\winserv.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Users\Admin\AppData\Roaming\Winserv\winserv.exeC:\Users\Admin\AppData\Roaming\Winserv\winserv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD583c468b78a1714944e5becf35401229b
SHA15bb1aaf85b2b973e4ba33fa8457aaf71e4987b34
SHA256da5fdb5a9d869b349244f1ab62d95b0dbd05ac12ff45a6db157da829566a6690
SHA512795aa24a35781ea1e91cdb1760aef90948a61c0f96f94f20585662bdce627443a702f7b2637472cb595e027b1989cec822959dcad4b121928dbb2f250b2df599
-
Filesize
177KB
MD5a84b1c3b52cca1e711f6ab96b6cab2b2
SHA1952516e5427aed05cd12c3007d45cdc46e2e1c64
SHA256e77bd161308fe005519f0ac053698ca7e05a76a0fc1e6e2b9f569a1a2c080488
SHA512fbca24489be96883f45929d815c72944b9983f7c6a6cf50c894c3d30428d98c0307f182648508d76cd036a6fc1b8780b1a3d3927e95a627d0772365ad553b55c
-
Filesize
253KB
MD5a6799120a6cd0a439e69cef0b39766f1
SHA1370711ba4a565d3b2bfa70d593e3ae2abfdeed9f
SHA256e2f2eadd2865cc21f36f641be666beaab4e97ccd2c56ba522846d1dd89f3a484
SHA512bb4e2ce1efffcc0ab3d11316f6bbb936a81c6093541a0395f995451b300a8a531bec35f56d53ff110fac6c2d9d4d515388dc1b8a42c45d1108ad179e27ca186c