Analysis
-
max time kernel
87s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:16
Behavioral task
behavioral1
Sample
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe
Resource
win7-20221111-en
General
-
Target
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe
-
Size
916KB
-
MD5
cf965508c61cba05253c4280972dcab4
-
SHA1
9e3296b6091ba1a05213e84dc72ecdf2936c2f9a
-
SHA256
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad
-
SHA512
0b7be7a57a828a3a2bfdff182405714046a70bb4dd11f6232c7c24dcd59576602aa6382c8c99e4aa66ed9c1017a2a9296ef8da0c98828a7617ef62fe47a3615e
-
SSDEEP
24576:mJnav4dbkHXlQTlACio/uyy5150XxiRE/z0:mav48X+TlAfUoteF/4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 872 setup.exe -
Processes:
resource yara_rule behavioral1/memory/1628-55-0x0000000001220000-0x00000000014D6000-memory.dmp upx \Users\Admin\AppData\Local\Temp\setup.exe upx C:\Users\Admin\AppData\Local\Temp\setup.exe upx C:\Users\Admin\AppData\Local\Temp\setup.exe upx behavioral1/memory/1628-61-0x0000000001220000-0x00000000014D6000-memory.dmp upx behavioral1/memory/872-62-0x0000000001120000-0x00000000013D6000-memory.dmp upx behavioral1/memory/872-63-0x0000000001120000-0x00000000013D6000-memory.dmp upx behavioral1/memory/872-64-0x0000000001120000-0x00000000013D6000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exepid process 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exesetup.exepid process 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe 872 setup.exe 872 setup.exe 872 setup.exe 872 setup.exe 872 setup.exe 872 setup.exe 872 setup.exe 872 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exedescription pid process target process PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe PID 1628 wrote to memory of 872 1628 4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe"C:\Users\Admin\AppData\Local\Temp\4df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5cf965508c61cba05253c4280972dcab4
SHA19e3296b6091ba1a05213e84dc72ecdf2936c2f9a
SHA2564df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad
SHA5120b7be7a57a828a3a2bfdff182405714046a70bb4dd11f6232c7c24dcd59576602aa6382c8c99e4aa66ed9c1017a2a9296ef8da0c98828a7617ef62fe47a3615e
-
Filesize
916KB
MD5cf965508c61cba05253c4280972dcab4
SHA19e3296b6091ba1a05213e84dc72ecdf2936c2f9a
SHA2564df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad
SHA5120b7be7a57a828a3a2bfdff182405714046a70bb4dd11f6232c7c24dcd59576602aa6382c8c99e4aa66ed9c1017a2a9296ef8da0c98828a7617ef62fe47a3615e
-
Filesize
916KB
MD5cf965508c61cba05253c4280972dcab4
SHA19e3296b6091ba1a05213e84dc72ecdf2936c2f9a
SHA2564df638a3b744df8981c53a7f6ebb39aa1b979aad51be1f273f7cd94ecd5966ad
SHA5120b7be7a57a828a3a2bfdff182405714046a70bb4dd11f6232c7c24dcd59576602aa6382c8c99e4aa66ed9c1017a2a9296ef8da0c98828a7617ef62fe47a3615e