Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:13

General

  • Target

    0bb0f209e50b87a21dd65f0eeac7128e96026fb7ace4d9b9223d2b28f0eb702a.exe

  • Size

    436KB

  • MD5

    5383411fd564aae161291016199915d2

  • SHA1

    01a31f6b8bcf556cc77caa089cbaa7696613c61e

  • SHA256

    0bb0f209e50b87a21dd65f0eeac7128e96026fb7ace4d9b9223d2b28f0eb702a

  • SHA512

    fc310a9db9bd446a2fb5b30047ca00cbb2e0efe35a5e9537c684cc8e8da286f95fcec8adeda245b91ab9046c2162b5807d60bf684a04dbfb906e1ce9eb4057e9

  • SSDEEP

    12288:xUbCGn0F45IAuMZWaRCd2aUwsdN5mne/zfMM3H3dcr2v:6bC4XuMZWwaU5lMM9Xv

Score
9/10

Malware Config

Signatures

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bb0f209e50b87a21dd65f0eeac7128e96026fb7ace4d9b9223d2b28f0eb702a.exe
    "C:\Users\Admin\AppData\Local\Temp\0bb0f209e50b87a21dd65f0eeac7128e96026fb7ace4d9b9223d2b28f0eb702a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\WinDefender.exe
      C:\Users\Admin\AppData\Local\Temp\WinDefender.exe /stext C:\Users\Admin\AppData\Local\Temp\WinDefender.txt
      2⤵
      • Executes dropped EXE
      PID:2552
    • C:\Users\Admin\AppData\Local\Temp\WinDefender.exe
      C:\Users\Admin\AppData\Local\Temp\WinDefender.exe /stext C:\Users\Admin\AppData\Local\Temp\WinDefender.txt
      2⤵
      • Executes dropped EXE
      PID:4952

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.cfg
    Filesize

    625B

    MD5

    53dd16e9e2c84000bfbaaccdd8c665cb

    SHA1

    ccc200b7209c1b1c2f53ef28f4921f381cbfc26b

    SHA256

    01f42a5556577633271e6f4fe2b1259cf2792334aa1da543009fc10548f57966

    SHA512

    74a8853b6a48c560a2b51593fd6255ed588a830cd41460976c6b1615da26d0138819007d4098636a589cf9c5e659881afafd2c32fca6930faee22a11af37f019

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.cfg
    Filesize

    625B

    MD5

    53dd16e9e2c84000bfbaaccdd8c665cb

    SHA1

    ccc200b7209c1b1c2f53ef28f4921f381cbfc26b

    SHA256

    01f42a5556577633271e6f4fe2b1259cf2792334aa1da543009fc10548f57966

    SHA512

    74a8853b6a48c560a2b51593fd6255ed588a830cd41460976c6b1615da26d0138819007d4098636a589cf9c5e659881afafd2c32fca6930faee22a11af37f019

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.exe
    Filesize

    330KB

    MD5

    0034bf63b590f7db029665c474bfbd17

    SHA1

    224d9e907ed2cac0d411a3072d8f447c01be8af7

    SHA256

    852a04e988a258d10a39db1721c2b49efa512367f0cdd459d3c8e6afbd64075f

    SHA512

    75f339cd90be002c8b58b23af74665f8855c9b092f9b1f9f22ae45783c5ce05c5fab25ae8334c0a9da4257e57b692196161e1dae442317f0c2aa1510a85e23fe

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.exe
    Filesize

    330KB

    MD5

    0034bf63b590f7db029665c474bfbd17

    SHA1

    224d9e907ed2cac0d411a3072d8f447c01be8af7

    SHA256

    852a04e988a258d10a39db1721c2b49efa512367f0cdd459d3c8e6afbd64075f

    SHA512

    75f339cd90be002c8b58b23af74665f8855c9b092f9b1f9f22ae45783c5ce05c5fab25ae8334c0a9da4257e57b692196161e1dae442317f0c2aa1510a85e23fe

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.exe
    Filesize

    330KB

    MD5

    0034bf63b590f7db029665c474bfbd17

    SHA1

    224d9e907ed2cac0d411a3072d8f447c01be8af7

    SHA256

    852a04e988a258d10a39db1721c2b49efa512367f0cdd459d3c8e6afbd64075f

    SHA512

    75f339cd90be002c8b58b23af74665f8855c9b092f9b1f9f22ae45783c5ce05c5fab25ae8334c0a9da4257e57b692196161e1dae442317f0c2aa1510a85e23fe

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.txt
    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Local\Temp\WinDefender.txt
    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2552-134-0x0000000000000000-mapping.dmp
  • memory/4444-132-0x00000000008F0000-0x0000000000964000-memory.dmp
    Filesize

    464KB

  • memory/4444-137-0x00007FFA31BE0000-0x00007FFA326A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4444-133-0x00007FFA31BE0000-0x00007FFA326A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4444-144-0x00007FFA31BE0000-0x00007FFA326A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4952-140-0x0000000000000000-mapping.dmp