Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 17:41
Behavioral task
behavioral1
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win10v2004-20230221-en
General
-
Target
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
-
Size
94KB
-
MD5
93fd11cf69ac4f2b596f4e51a561b7b0
-
SHA1
077e1d02b17f023a13e64b43d9b19764705e3e8d
-
SHA256
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
-
SHA512
4d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
SSDEEP
1536:QNDrcwsIe38pzMX4Zm3QVd4lrYKIgInPv2Pvl/XNas2fRBW5nrJrc:QNDrpArCcQVd46bnPvuozrW5nrJo
Malware Config
Signatures
-
Detects Lobshot family 2 IoCs
resource yara_rule behavioral1/files/0x000300000000073b-135.dat family_lobshot behavioral1/files/0x000300000000073b-136.dat family_lobshot -
Executes dropped EXE 1 IoCs
pid Process 1116 cb4180a5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" cb4180a5.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 392 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 444 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 444 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 1116 cb4180a5.exe 1116 cb4180a5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 444 wrote to memory of 1076 444 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 84 PID 444 wrote to memory of 1076 444 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 84 PID 444 wrote to memory of 1076 444 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 84 PID 1076 wrote to memory of 392 1076 cmd.exe 86 PID 1076 wrote to memory of 392 1076 cmd.exe 86 PID 1076 wrote to memory of 392 1076 cmd.exe 86 PID 1076 wrote to memory of 1116 1076 cmd.exe 88 PID 1076 wrote to memory of 1116 1076 cmd.exe 88 PID 1076 wrote to memory of 1116 1076 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping -n 10 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe") & (start "" "C:\ProgramData\cb4180a5.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.0.0.13⤵
- Runs ping.exe
PID:392
-
-
C:\ProgramData\cb4180a5.exe"C:\ProgramData\cb4180a5.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372