Resubmissions

18/07/2023, 04:51

230718-fg3s3ahb3t 7

18/07/2023, 02:30

230718-cy9fdsfh72 7

Analysis

  • max time kernel
    128s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/07/2023, 04:51

General

  • Target

    012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe

  • Size

    17KB

  • MD5

    150e53a8c852ac5f23f47aceef452542

  • SHA1

    a6b272f822b6205526ba56eee936afae1e695b0e

  • SHA256

    012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240

  • SHA512

    acf3b6877d695943208b049566e253cbd822f364e8e161b0f06963aad2d07d0cf9f7314801eebcfa021a11284b313a0ed2688bf03dc82ff0120fdb03bc11a3ba

  • SSDEEP

    384:Kz+m1kuPZXHcaYbT1AnoKRiwWy8PG8Xj6r:KzrOeZXHYbxcPRixy8e8XjS

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe
    "C:\Users\Admin\AppData\Local\Temp\012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1464
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1464 -s 2028
      2⤵
      • Program crash
      PID:4552

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\Pictures\bnlnbuhksd4.zip

          Filesize

          11KB

          MD5

          77fe5264c8d9f3d4a624195a98e6c018

          SHA1

          0920be458c6166f27b0b891c4d1c19dd3cea0664

          SHA256

          8556661f140c92640222a9c39d1df88a00a8576a3007b326b005c2776902069c

          SHA512

          ea52a927e4331f6c17bb549723f94e0537ccf6f6e48995e655d028384d0b955618d3559114f56009c641fbfbf6980f0c502c73153e69741295cb6806ad62cfb3

        • memory/1464-117-0x000001F1C06D0000-0x000001F1C06D8000-memory.dmp

          Filesize

          32KB

        • memory/1464-118-0x00007FFA09370000-0x00007FFA09D5C000-memory.dmp

          Filesize

          9.9MB

        • memory/1464-119-0x000001F1C23F0000-0x000001F1C2400000-memory.dmp

          Filesize

          64KB

        • memory/1464-120-0x000001F1C0A80000-0x000001F1C0A92000-memory.dmp

          Filesize

          72KB

        • memory/1464-121-0x000001F1C0A70000-0x000001F1C0A7A000-memory.dmp

          Filesize

          40KB

        • memory/1464-144-0x00007FFA09370000-0x00007FFA09D5C000-memory.dmp

          Filesize

          9.9MB

        • memory/1464-145-0x000001F1C23F0000-0x000001F1C2400000-memory.dmp

          Filesize

          64KB