Analysis
-
max time kernel
80s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 10:50
Static task
static1
Behavioral task
behavioral1
Sample
70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe
Resource
win7-20230220-en
General
-
Target
70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe
-
Size
3.1MB
-
MD5
cd12cb026f70700b6d7d3122360c52e8
-
SHA1
b944514f2b56e27a9b5e26316f72fd9fec8aa94c
-
SHA256
70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655
-
SHA512
6e9c3d683dbf9e16ae868ceb3078dffe330b7b81f50de204aab5d10d3b3baede98853b7f4f9fd2e871d6aa439716c9b6c0cef416478845954a7a08d8efe71f19
-
SSDEEP
49152:T5wh59b5nEKS6JKokJL06d4vD9GJjq/5qS3mynxdD4/7AQxDy:TUnuxBzd1IgYmoIfD
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4168 powershell.exe 4168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4168 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exedescription pid process target process PID 3516 wrote to memory of 4168 3516 70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe powershell.exe PID 3516 wrote to memory of 4168 3516 70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe"C:\Users\Admin\AppData\Local\Temp\70805738871f24f390c7b1e62e6b48bc4850399992d8b62bba3160550a0a3655.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD51ab41d31fb0aed60edd9d20bc7e1163c
SHA1b6659275b17b9ed641b3ba67481d406306206597
SHA25666983b3c0ea1729d22240ec942dbd5c31573756fa079de413cc2ea2b4ccf43a8
SHA512f7c995f257f093593ee33f2d2cfc8fba015cf8c2043c4af1038e04cebe34a5b33cb2cd111128203556c10713b07e37aa604b38a63d8bfc8568229a987696d4cd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5651d855bcf44adceccfd3fffcd32956d
SHA145ac6cb8bd69976f45a37bf86193bd4c8e03fce9
SHA2564ada554163d26c8a3385d4fe372fc132971c867e23927a35d72a98aadb25b57b
SHA51267b4683a4e780093e5b3e73ea906a42c74f96a9234845114e0ea6e61ab0308c2e5b7f12d3428ce5bf48928863c102f57c011f9cdc4589d2d82c078b3db70c31f
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574