Analysis
-
max time kernel
105s -
max time network
59s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01/10/2021, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
gwq6YRD8.exe
Resource
win7v20210408
0 signatures
0 seconds
General
-
Target
gwq6YRD8.exe
-
Size
993KB
-
MD5
d3a501cec812ab3556e256429e2387a5
-
SHA1
273924b22cc3ae8172ec4e13d6a4d01d9ea5dd9f
-
SHA256
93082becf838b94356514a5f5ae205ae6928540a9cef12722fe52cabb9a0a33d
-
SHA512
18598996a2d0d176256b490737eca73be461f39a08e555d010658177329912e7ff43e0dfe43c36196386fa3c159a549e29df148f7f250b59e4197ab6cffbd139
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2455352368-1077083310-2879168483-1000\desktop.ini gwq6YRD8.exe File opened for modification C:\Program Files\desktop.ini gwq6YRD8.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini gwq6YRD8.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini gwq6YRD8.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\CompressUndo.fon gwq6YRD8.exe File opened for modification C:\Program Files\DebugExit.emz gwq6YRD8.exe File opened for modification C:\Program Files\FormatClose.vb gwq6YRD8.exe File opened for modification C:\Program Files\InstallUninstall.xlsm gwq6YRD8.exe File opened for modification C:\Program Files\MeasureDisconnect.raw gwq6YRD8.exe File opened for modification C:\Program Files\CloseExit.lnk gwq6YRD8.exe File opened for modification C:\Program Files\RequestComplete.emf gwq6YRD8.exe File opened for modification C:\Program Files\ResetUnregister.cmd gwq6YRD8.exe File opened for modification C:\Program Files\SelectApprove.midi gwq6YRD8.exe File opened for modification C:\Program Files\desktop.ini gwq6YRD8.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 332 wrote to memory of 772 332 gwq6YRD8.exe 28 PID 332 wrote to memory of 772 332 gwq6YRD8.exe 28 PID 332 wrote to memory of 772 332 gwq6YRD8.exe 28 PID 332 wrote to memory of 772 332 gwq6YRD8.exe 28 PID 332 wrote to memory of 680 332 gwq6YRD8.exe 29 PID 332 wrote to memory of 680 332 gwq6YRD8.exe 29 PID 332 wrote to memory of 680 332 gwq6YRD8.exe 29 PID 332 wrote to memory of 680 332 gwq6YRD8.exe 29 PID 332 wrote to memory of 1496 332 gwq6YRD8.exe 30 PID 332 wrote to memory of 1496 332 gwq6YRD8.exe 30 PID 332 wrote to memory of 1496 332 gwq6YRD8.exe 30 PID 332 wrote to memory of 1496 332 gwq6YRD8.exe 30 PID 332 wrote to memory of 1488 332 gwq6YRD8.exe 31 PID 332 wrote to memory of 1488 332 gwq6YRD8.exe 31 PID 332 wrote to memory of 1488 332 gwq6YRD8.exe 31 PID 332 wrote to memory of 1488 332 gwq6YRD8.exe 31 PID 1488 wrote to memory of 1484 1488 cmd.exe 32 PID 1488 wrote to memory of 1484 1488 cmd.exe 32 PID 1488 wrote to memory of 1484 1488 cmd.exe 32 PID 1488 wrote to memory of 1484 1488 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\gwq6YRD8.exe"C:\Users\Admin\AppData\Local\Temp\gwq6YRD8.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vol C:2⤵PID:772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vol C:2⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vol C:2⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c notepad "D9F57D92.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\notepad.exenotepad "D9F57D92.txt"3⤵PID:1484
-
-