Analysis
-
max time kernel
50s -
max time network
175s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-02-2023 04:48
Behavioral task
behavioral1
Sample
14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe
Resource
win7-20230220-en
General
-
Target
14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe
-
Size
4.4MB
-
MD5
15ae1218c1c773497a6a5e6db8d11922
-
SHA1
8596dbd6e5e7dfdfbacd04051d192dd597d72b67
-
SHA256
14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf
-
SHA512
57c417052ace7f7e1b4c60da0549e733e6e1bcc35c3c952a0595501248ef25a801e71148d55334aeb38c57a9ecb851476f7c34fab86ee00d319e95ac79f4c45b
-
SSDEEP
49152:yb9BphIVBmo8cBBThHHCrmYVzZLbdIo0MaN5EyKktGH5R7of01N:ipCmo/CrmyVYEqGZR7n
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 3388 wmic.exe Token: SeSecurityPrivilege 3388 wmic.exe Token: SeTakeOwnershipPrivilege 3388 wmic.exe Token: SeLoadDriverPrivilege 3388 wmic.exe Token: SeSystemProfilePrivilege 3388 wmic.exe Token: SeSystemtimePrivilege 3388 wmic.exe Token: SeProfSingleProcessPrivilege 3388 wmic.exe Token: SeIncBasePriorityPrivilege 3388 wmic.exe Token: SeCreatePagefilePrivilege 3388 wmic.exe Token: SeBackupPrivilege 3388 wmic.exe Token: SeRestorePrivilege 3388 wmic.exe Token: SeShutdownPrivilege 3388 wmic.exe Token: SeDebugPrivilege 3388 wmic.exe Token: SeSystemEnvironmentPrivilege 3388 wmic.exe Token: SeRemoteShutdownPrivilege 3388 wmic.exe Token: SeUndockPrivilege 3388 wmic.exe Token: SeManageVolumePrivilege 3388 wmic.exe Token: 33 3388 wmic.exe Token: 34 3388 wmic.exe Token: 35 3388 wmic.exe Token: 36 3388 wmic.exe Token: SeIncreaseQuotaPrivilege 3388 wmic.exe Token: SeSecurityPrivilege 3388 wmic.exe Token: SeTakeOwnershipPrivilege 3388 wmic.exe Token: SeLoadDriverPrivilege 3388 wmic.exe Token: SeSystemProfilePrivilege 3388 wmic.exe Token: SeSystemtimePrivilege 3388 wmic.exe Token: SeProfSingleProcessPrivilege 3388 wmic.exe Token: SeIncBasePriorityPrivilege 3388 wmic.exe Token: SeCreatePagefilePrivilege 3388 wmic.exe Token: SeBackupPrivilege 3388 wmic.exe Token: SeRestorePrivilege 3388 wmic.exe Token: SeShutdownPrivilege 3388 wmic.exe Token: SeDebugPrivilege 3388 wmic.exe Token: SeSystemEnvironmentPrivilege 3388 wmic.exe Token: SeRemoteShutdownPrivilege 3388 wmic.exe Token: SeUndockPrivilege 3388 wmic.exe Token: SeManageVolumePrivilege 3388 wmic.exe Token: 33 3388 wmic.exe Token: 34 3388 wmic.exe Token: 35 3388 wmic.exe Token: 36 3388 wmic.exe Token: SeIncreaseQuotaPrivilege 3964 WMIC.exe Token: SeSecurityPrivilege 3964 WMIC.exe Token: SeTakeOwnershipPrivilege 3964 WMIC.exe Token: SeLoadDriverPrivilege 3964 WMIC.exe Token: SeSystemProfilePrivilege 3964 WMIC.exe Token: SeSystemtimePrivilege 3964 WMIC.exe Token: SeProfSingleProcessPrivilege 3964 WMIC.exe Token: SeIncBasePriorityPrivilege 3964 WMIC.exe Token: SeCreatePagefilePrivilege 3964 WMIC.exe Token: SeBackupPrivilege 3964 WMIC.exe Token: SeRestorePrivilege 3964 WMIC.exe Token: SeShutdownPrivilege 3964 WMIC.exe Token: SeDebugPrivilege 3964 WMIC.exe Token: SeSystemEnvironmentPrivilege 3964 WMIC.exe Token: SeRemoteShutdownPrivilege 3964 WMIC.exe Token: SeUndockPrivilege 3964 WMIC.exe Token: SeManageVolumePrivilege 3964 WMIC.exe Token: 33 3964 WMIC.exe Token: 34 3964 WMIC.exe Token: 35 3964 WMIC.exe Token: 36 3964 WMIC.exe Token: SeIncreaseQuotaPrivilege 3964 WMIC.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.execmd.execmd.exedescription pid process target process PID 3244 wrote to memory of 3388 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe wmic.exe PID 3244 wrote to memory of 3388 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe wmic.exe PID 3244 wrote to memory of 2044 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe cmd.exe PID 3244 wrote to memory of 2044 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe cmd.exe PID 2044 wrote to memory of 3964 2044 cmd.exe WMIC.exe PID 2044 wrote to memory of 3964 2044 cmd.exe WMIC.exe PID 3244 wrote to memory of 4564 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe cmd.exe PID 3244 wrote to memory of 4564 3244 14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe cmd.exe PID 4564 wrote to memory of 4104 4564 cmd.exe WMIC.exe PID 4564 wrote to memory of 4104 4564 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe"C:\Users\Admin\AppData\Local\Temp\14711577406a5d442440b680200c3e2837cdbefe8416f0b50a98849d602b04cf.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nJObCsNVlgTeMaPEZQleQYhYzRyWJjPjFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4