Analysis
-
max time kernel
48s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe
Resource
win7-20230703-en
General
-
Target
48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe
-
Size
7.5MB
-
MD5
309aef472f49e47a5908ca062df7fe9b
-
SHA1
e643bfbb647fb92ff76583ba0fbb22dbd264cffd
-
SHA256
48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585
-
SHA512
de662d3a7d666fcf643c93e0071ff80d19f1a2d7743ef66695aee874ffff2bae7ec3e6554305336935057281ac636ffb787414a0469b0e66d22fd3decbe43e71
-
SSDEEP
98304:+hNX7q3ShRFiURm15ziIoo5br3lfjiBrC3+K4zno:+htO3ShRFi6m15ziIlb5PuK4
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3808 5112 48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe 83 PID 5112 wrote to memory of 3808 5112 48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe 83 PID 3808 wrote to memory of 3940 3808 cmd.exe 85 PID 3808 wrote to memory of 3940 3808 cmd.exe 85 PID 3940 wrote to memory of 4876 3940 cmd.exe 86 PID 3940 wrote to memory of 4876 3940 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe"C:\Users\Admin\AppData\Local\Temp\48ec28f19f8ecda25aeb95a1ec42770f0ee8814ef2cffbd385c906b8c8bbc585.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\cmd.execmd /C C:\Users\Admin\Documents\1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh wlan show profiles3⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4876
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD502694999296110c950718a7b6fd2c798
SHA164aa3a819e9d7e7eea0dbf0a9648098c93e86a1a
SHA256dc4143079d767dc7f1a4ea9343c62d1f4c2bf3974497bc462c3cf866f9e500f4
SHA5127c870916e3f64e4fcfaf2fec278ec5a91209180f918486bbae5a5dbd5661f02859c9f6033d32ae0b41855f484202bb37522f2a4a7c63485ac53d6a304eb25e85