Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2023 07:51
Behavioral task
behavioral1
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win10v2004-20230220-en
General
-
Target
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
-
Size
94KB
-
MD5
93fd11cf69ac4f2b596f4e51a561b7b0
-
SHA1
077e1d02b17f023a13e64b43d9b19764705e3e8d
-
SHA256
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
-
SHA512
4d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
SSDEEP
1536:QNDrcwsIe38pzMX4Zm3QVd4lrYKIgInPv2Pvl/XNas2fRBW5nrJrc:QNDrpArCcQVd46bnPvuozrW5nrJo
Malware Config
Signatures
-
Detects Lobshot family 2 IoCs
resource yara_rule behavioral2/files/0x000300000001e702-135.dat family_lobshot behavioral2/files/0x000300000001e702-136.dat family_lobshot -
Executes dropped EXE 1 IoCs
pid Process 3176 cb4180a5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" cb4180a5.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4224 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 1964 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 3176 cb4180a5.exe 3176 cb4180a5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3008 1964 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 83 PID 1964 wrote to memory of 3008 1964 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 83 PID 1964 wrote to memory of 3008 1964 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 83 PID 3008 wrote to memory of 4224 3008 cmd.exe 85 PID 3008 wrote to memory of 4224 3008 cmd.exe 85 PID 3008 wrote to memory of 4224 3008 cmd.exe 85 PID 3008 wrote to memory of 3176 3008 cmd.exe 90 PID 3008 wrote to memory of 3176 3008 cmd.exe 90 PID 3008 wrote to memory of 3176 3008 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping -n 10 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe") & (start "" "C:\ProgramData\cb4180a5.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.0.0.13⤵
- Runs ping.exe
PID:4224
-
-
C:\ProgramData\cb4180a5.exe"C:\ProgramData\cb4180a5.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372