Overview
overview
10Static
static
3Engine.js
windows7-x64
3Engine.js
windows10-2004-x64
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10bin/UbuilderB.exe
windows7-x64
1bin/UbuilderB.exe
windows10-2004-x64
7bin/scv.jar
windows7-x64
1bin/scv.jar
windows10-2004-x64
1cutline.ppt
windows7-x64
1cutline.ppt
windows10-2004-x64
1d3dx9_43.dll
windows7-x64
1d3dx9_43.dll
windows10-2004-x64
1packages/D...1].exe
windows7-x64
1packages/D...1].exe
windows10-2004-x64
1xNet.dll
windows7-x64
1xNet.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
Engine.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Engine.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
bin/UbuilderB.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
bin/UbuilderB.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
bin/scv.jar
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
bin/scv.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
cutline.ppt
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
cutline.ppt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
d3dx9_43.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
d3dx9_43.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
packages/DirectoryMonitor_[1MB]_[1].exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
packages/DirectoryMonitor_[1MB]_[1].exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
xNet.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
xNet.dll
Resource
win10v2004-20240508-en
General
-
Target
Setup.exe
-
Size
2.7MB
-
MD5
870feaab725b148208dd12ffabe33f9d
-
SHA1
9f3651ad5725848c880c24f8e749205a7e1e78c1
-
SHA256
bbf7154f14d736f0c8491fb9fb44d2f179cdb02d34ab54c04466fa0702ea7d55
-
SHA512
5bea301f85e6a55fd5730793b960442bc4dab92d0bf47e4e55c5490448a4a22ed6d0feb1dbe9d56d6b6ff8d06f163381807f83f467621f527bc6521857fc8e1a
-
SSDEEP
49152:C11fbWXfBeBqTww8Gkfoa0yeL8zj9JLF+lP/MatsfHVnZbhG3EVsMI62Pseaj/1n:QbWkuwwjkULhlPUatsfBxhsE
Malware Config
Extracted
stealc
ANNA2
https://safefiledownloadsoft.com
-
url_path
/725c63b56c99aa26.php
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
netsh.exeTraceFmt.exeWerFault.exepid process 2028 netsh.exe 2028 netsh.exe 2708 TraceFmt.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 820 set thread context of 2028 820 Setup.exe netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2492 2708 WerFault.exe TraceFmt.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TraceFmt.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TraceFmt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TraceFmt.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Setup.exenetsh.exeTraceFmt.exepid process 820 Setup.exe 820 Setup.exe 2028 netsh.exe 2028 netsh.exe 2708 TraceFmt.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exenetsh.exepid process 820 Setup.exe 2028 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Setup.exenetsh.exeTraceFmt.exedescription pid process target process PID 820 wrote to memory of 2028 820 Setup.exe netsh.exe PID 820 wrote to memory of 2028 820 Setup.exe netsh.exe PID 820 wrote to memory of 2028 820 Setup.exe netsh.exe PID 820 wrote to memory of 2028 820 Setup.exe netsh.exe PID 820 wrote to memory of 2028 820 Setup.exe netsh.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe PID 2708 wrote to memory of 2492 2708 TraceFmt.exe WerFault.exe PID 2708 wrote to memory of 2492 2708 TraceFmt.exe WerFault.exe PID 2708 wrote to memory of 2492 2708 TraceFmt.exe WerFault.exe PID 2708 wrote to memory of 2492 2708 TraceFmt.exe WerFault.exe PID 2028 wrote to memory of 2708 2028 netsh.exe TraceFmt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Loads dropped DLL
- Event Triggered Execution: Netsh Helper DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\TraceFmt.exeC:\Users\Admin\AppData\Local\Temp\TraceFmt.exe3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2844⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a014fb74Filesize
1.3MB
MD5192882e810e581aad16b3a052ba56349
SHA1ba4e80a753a754cae631f569ce3f6e39bc7770b2
SHA25619833264acebe7bb6fcc7c1aff1cf7dffb549081b0aa9d8419f4bc9984779e33
SHA51288ec388cee7373b0fb14b96fd78abcb703c623379be46e69d512a347ba50757166d1ad53fd5287d8dce1e5b09aa162d5aa5123f186ad8927a9bb3962fc99d67d
-
\Users\Admin\AppData\Local\Temp\TraceFmt.exeFilesize
433KB
MD5fea067901f48a5f1faf7ca3b373f1a8f
SHA1e8abe0deb87de9fe3bb3a611234584e9a9b17cce
SHA256bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152
SHA51207c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023
-
memory/820-0-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/820-1-0x0000000076EA0000-0x0000000077049000-memory.dmpFilesize
1.7MB
-
memory/820-5-0x0000000074002000-0x0000000074004000-memory.dmpFilesize
8KB
-
memory/820-6-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/820-7-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/2028-13-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/2028-11-0x0000000076EA0000-0x0000000077049000-memory.dmpFilesize
1.7MB
-
memory/2028-14-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/2028-10-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/2028-22-0x0000000073FF0000-0x0000000074164000-memory.dmpFilesize
1.5MB
-
memory/2708-23-0x0000000000400000-0x000000000063E000-memory.dmpFilesize
2.2MB
-
memory/2708-25-0x0000000076EA0000-0x0000000077049000-memory.dmpFilesize
1.7MB
-
memory/2708-26-0x0000000000400000-0x000000000063E000-memory.dmpFilesize
2.2MB
-
memory/2708-28-0x0000000000EB5000-0x0000000000EBD000-memory.dmpFilesize
32KB
-
memory/2708-29-0x0000000000E70000-0x0000000000F2A000-memory.dmpFilesize
744KB
-
memory/2708-35-0x0000000000400000-0x000000000063E000-memory.dmpFilesize
2.2MB
-
memory/2708-36-0x0000000000400000-0x000000000063E000-memory.dmpFilesize
2.2MB