Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
d27b20602db59697c20293d02aef1e433f98baf4.exe
Resource
win7-20221111-en
windows7-x64
13 signatures
150 seconds
General
-
Target
d27b20602db59697c20293d02aef1e433f98baf4.exe
-
Size
1.2MB
-
MD5
9190513275b80db066cc1a2275c01af1
-
SHA1
d27b20602db59697c20293d02aef1e433f98baf4
-
SHA256
36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00
-
SHA512
c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc
-
SSDEEP
12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 41 4248 wscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1976 set thread context of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 4576 set thread context of 2724 4576 AddInProcess32.exe 35 PID 4248 set thread context of 2724 4248 wscript.exe 35 -
Program crash 1 IoCs
pid pid_target Process procid_target 1312 1500 WerFault.exe 105 -
description ioc Process Key created \Registry\User\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4576 AddInProcess32.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe 4248 wscript.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe Token: SeDebugPrivilege 4576 AddInProcess32.exe Token: SeShutdownPrivilege 2724 Explorer.EXE Token: SeCreatePagefilePrivilege 2724 Explorer.EXE Token: SeShutdownPrivilege 2724 Explorer.EXE Token: SeCreatePagefilePrivilege 2724 Explorer.EXE Token: SeDebugPrivilege 4248 wscript.exe Token: SeShutdownPrivilege 2724 Explorer.EXE Token: SeCreatePagefilePrivilege 2724 Explorer.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2792 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 82 PID 1976 wrote to memory of 2792 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 82 PID 1976 wrote to memory of 3280 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 1976 wrote to memory of 3280 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 83 PID 1976 wrote to memory of 5088 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 1976 wrote to memory of 5088 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 84 PID 1976 wrote to memory of 4152 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 1976 wrote to memory of 4152 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 85 PID 1976 wrote to memory of 924 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 89 PID 1976 wrote to memory of 924 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 89 PID 1976 wrote to memory of 920 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 88 PID 1976 wrote to memory of 920 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 88 PID 1976 wrote to memory of 936 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1976 wrote to memory of 936 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 87 PID 1976 wrote to memory of 3848 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 1976 wrote to memory of 3848 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 86 PID 1976 wrote to memory of 1972 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 90 PID 1976 wrote to memory of 1972 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 90 PID 1976 wrote to memory of 1128 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 91 PID 1976 wrote to memory of 1128 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 91 PID 1976 wrote to memory of 1376 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 92 PID 1976 wrote to memory of 1376 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 92 PID 1976 wrote to memory of 1652 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 93 PID 1976 wrote to memory of 1652 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 93 PID 1976 wrote to memory of 3528 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 94 PID 1976 wrote to memory of 3528 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 94 PID 1976 wrote to memory of 1664 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 1976 wrote to memory of 1664 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 95 PID 1976 wrote to memory of 1596 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 96 PID 1976 wrote to memory of 1596 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 96 PID 1976 wrote to memory of 1596 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 96 PID 1976 wrote to memory of 5112 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 97 PID 1976 wrote to memory of 5112 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 97 PID 1976 wrote to memory of 1840 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 98 PID 1976 wrote to memory of 1840 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 98 PID 1976 wrote to memory of 1828 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 99 PID 1976 wrote to memory of 1828 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 99 PID 1976 wrote to memory of 4252 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 100 PID 1976 wrote to memory of 4252 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 100 PID 1976 wrote to memory of 4456 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 103 PID 1976 wrote to memory of 4456 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 103 PID 1976 wrote to memory of 3276 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 102 PID 1976 wrote to memory of 3276 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 102 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 1976 wrote to memory of 4576 1976 d27b20602db59697c20293d02aef1e433f98baf4.exe 101 PID 2724 wrote to memory of 4248 2724 Explorer.EXE 104 PID 2724 wrote to memory of 4248 2724 Explorer.EXE 104 PID 2724 wrote to memory of 4248 2724 Explorer.EXE 104 PID 4248 wrote to memory of 1500 4248 wscript.exe 105 PID 4248 wrote to memory of 1500 4248 wscript.exe 105 PID 4248 wrote to memory of 1500 4248 wscript.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"3⤵PID:2792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"3⤵PID:3280
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"3⤵PID:5088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"3⤵PID:4152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"3⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"3⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"3⤵PID:920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"3⤵PID:924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"3⤵PID:1972
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"3⤵PID:1128
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"3⤵PID:1376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"3⤵PID:1652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵PID:3528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"3⤵PID:1664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"3⤵PID:1596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"3⤵PID:5112
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"3⤵PID:1840
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"3⤵PID:1828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"3⤵PID:4252
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"3⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"3⤵PID:4456
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1500
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1500 -s 1924⤵
- Program crash
PID:1312
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1500 -ip 15001⤵PID:2832