Analysis
-
max time kernel
151s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe
Resource
win7-20221111-en
General
-
Target
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe
-
Size
251KB
-
MD5
07674572cf79953c21898b8014967e52
-
SHA1
fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
-
SHA256
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
-
SHA512
7c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b
-
SSDEEP
3072:4ar2vYb/wk6D6EWOzYQjqRbC+h7jTBLjF5FemO9QbBLUcLTUEwhdI:4ayvYb/wk6TWOALhXTB0meQlUcLQEw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
search.json.exepid process 4664 search.json.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exedescription pid process target process PID 968 set thread context of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
search.json.exepid process 4664 search.json.exe 4664 search.json.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exedescription pid process Token: SeSecurityPrivilege 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe Token: SeSecurityPrivilege 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exesearch.json.exedescription pid process target process PID 968 wrote to memory of 4664 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe search.json.exe PID 968 wrote to memory of 4664 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe search.json.exe PID 968 wrote to memory of 4664 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe search.json.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 1924 4664 search.json.exe explorer.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 4664 wrote to memory of 968 4664 search.json.exe 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe PID 968 wrote to memory of 812 968 9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe"C:\Users\Admin\AppData\Local\Temp\9fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\search.json.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\search.json.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2f13090c.bat"2⤵PID:812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD507674572cf79953c21898b8014967e52
SHA1fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
SHA2569fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
SHA5127c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b
-
Filesize
251KB
MD507674572cf79953c21898b8014967e52
SHA1fd6c764b9b4fbd2c1dec2f26a5386bc48e769346
SHA2569fc38c978d4a87b5a9c9c1d5cdbfaf79243f1c9afcd304d1b04a36fb830ccd90
SHA5127c947f210c575d6b38a7fb5e5dd4ecee409c2df389fb285644175be1e713ca29d0a9dc321bcb37fa85ed26a7a08e9a12c3e9d9be45de7f42e1fae3c8015a8f0b