Analysis
-
max time kernel
139s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe
Resource
win7-20220812-en
General
-
Target
cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe
-
Size
300KB
-
MD5
84a9c802cffc9f77b0e4a0b7e2fc99c3
-
SHA1
7c45cfd546653532cbf86f683c6992ceb655b163
-
SHA256
cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99
-
SHA512
8b935eb62ce19b3f9810b76b25362a784aad648d8756fa9e65e7833616eb74730dc1898dce60a653d1da703e3b7c345151f8e4c49b1a873138eefa61f73c57ed
-
SSDEEP
6144:+SB1Ed0h/CB5OVhc97oZ7CelWsGneR+vulB24aJ+GE6TD4kZY1wgbvrNCqn6hY:+81Ed0hYcVhlJCekbGxGEOD4J1wgbvRZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1900 Wab.exe -
Loads dropped DLL 2 IoCs
pid Process 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26 PID 1160 wrote to memory of 1900 1160 cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe"C:\Users\Admin\AppData\Local\Temp\cca394731efb154685d205949584d927b6e47e28c87b6dcd4a1a8b88dad69c99.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Wab.exe"C:\Users\Admin\AppData\Local\Temp\Wab.exe"2⤵
- Executes dropped EXE
PID:1900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5892a4994e2f2b21a5f4c7cf81948d8c8
SHA17d6a3813ba4da33014fa297cf3d351207e5521eb
SHA25634f61ff5fbe53561b5e77b113307e22a187dcb59418bdf2696500982d2c07809
SHA512f44b1ad47d9d120b74a8a12b69b68c5a789615922f29d50f712b8bc9ebb5972bcfe6cca89066b3793a32e3254073778e97d98580db1ef535d4e431c02d2929e7
-
Filesize
491KB
MD5892a4994e2f2b21a5f4c7cf81948d8c8
SHA17d6a3813ba4da33014fa297cf3d351207e5521eb
SHA25634f61ff5fbe53561b5e77b113307e22a187dcb59418bdf2696500982d2c07809
SHA512f44b1ad47d9d120b74a8a12b69b68c5a789615922f29d50f712b8bc9ebb5972bcfe6cca89066b3793a32e3254073778e97d98580db1ef535d4e431c02d2929e7
-
Filesize
491KB
MD5892a4994e2f2b21a5f4c7cf81948d8c8
SHA17d6a3813ba4da33014fa297cf3d351207e5521eb
SHA25634f61ff5fbe53561b5e77b113307e22a187dcb59418bdf2696500982d2c07809
SHA512f44b1ad47d9d120b74a8a12b69b68c5a789615922f29d50f712b8bc9ebb5972bcfe6cca89066b3793a32e3254073778e97d98580db1ef535d4e431c02d2929e7