Analysis
-
max time kernel
123s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
23-06-2023 07:48
Behavioral task
behavioral1
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win10v2004-20230621-en
General
-
Target
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
-
Size
94KB
-
MD5
93fd11cf69ac4f2b596f4e51a561b7b0
-
SHA1
077e1d02b17f023a13e64b43d9b19764705e3e8d
-
SHA256
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
-
SHA512
4d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
SSDEEP
1536:QNDrcwsIe38pzMX4Zm3QVd4lrYKIgInPv2Pvl/XNas2fRBW5nrJrc:QNDrpArCcQVd46bnPvuozrW5nrJo
Malware Config
Signatures
-
Detects Lobshot family 4 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ea-56.dat family_lobshot behavioral1/files/0x000b0000000122ea-55.dat family_lobshot behavioral1/files/0x000b0000000122ea-57.dat family_lobshot behavioral1/files/0x000b0000000122ea-58.dat family_lobshot -
Deletes itself 1 IoCs
pid Process 1748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 588 cb4180a5.exe -
Loads dropped DLL 2 IoCs
pid Process 1748 cmd.exe 1748 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" cb4180a5.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 940 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 588 cb4180a5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1748 1308 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 28 PID 1308 wrote to memory of 1748 1308 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 28 PID 1308 wrote to memory of 1748 1308 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 28 PID 1308 wrote to memory of 1748 1308 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 28 PID 1748 wrote to memory of 940 1748 cmd.exe 30 PID 1748 wrote to memory of 940 1748 cmd.exe 30 PID 1748 wrote to memory of 940 1748 cmd.exe 30 PID 1748 wrote to memory of 940 1748 cmd.exe 30 PID 1748 wrote to memory of 588 1748 cmd.exe 31 PID 1748 wrote to memory of 588 1748 cmd.exe 31 PID 1748 wrote to memory of 588 1748 cmd.exe 31 PID 1748 wrote to memory of 588 1748 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping -n 10 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe") & (start "" "C:\ProgramData\cb4180a5.exe")2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.0.0.13⤵
- Runs ping.exe
PID:940
-
-
C:\ProgramData\cb4180a5.exe"C:\ProgramData\cb4180a5.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372