Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 13:11
Static task
static1
Behavioral task
behavioral1
Sample
adb7d29709bbc6b756cca7b7dda5658e.exe
Resource
win7-20230712-en
General
-
Target
adb7d29709bbc6b756cca7b7dda5658e.exe
-
Size
2.3MB
-
MD5
adb7d29709bbc6b756cca7b7dda5658e
-
SHA1
41487c37e04720a70d6f2c467aaacbf999e11bd5
-
SHA256
2e976baf097df5f017d2ed15f3456345d0180afbf5910432d7629a29fdf75fef
-
SHA512
f0562cac20ac06a5c2c3f674b02aaf1dab97556f69fa759a410c1618945c89b15c0e49473fe269c13b6fbe133418c77a041857e0fcd0a3d4c6fc1f4aa2b02ff4
-
SSDEEP
24576:mxltyHQflUh/U5owayCu20tjmbCgCQtAERGsUdMhlh:mxbflOadltgCQsrMhX
Malware Config
Extracted
amadey
3.86
45.9.74.182/b7djSDcPcZ/index.php
Signatures
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\assdfmdswkhs.lnk adb7d29709bbc6b756cca7b7dda5658e.exe -
Loads dropped DLL 3 IoCs
pid Process 1632 rundll32.exe 2112 rundll32.exe 5084 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1968 5084 WerFault.exe 104 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4796 adb7d29709bbc6b756cca7b7dda5658e.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4796 wrote to memory of 4584 4796 adb7d29709bbc6b756cca7b7dda5658e.exe 93 PID 4584 wrote to memory of 2112 4584 MsBuild.exe 102 PID 4584 wrote to memory of 2112 4584 MsBuild.exe 102 PID 4584 wrote to memory of 2112 4584 MsBuild.exe 102 PID 4584 wrote to memory of 1632 4584 MsBuild.exe 103 PID 4584 wrote to memory of 1632 4584 MsBuild.exe 103 PID 4584 wrote to memory of 1632 4584 MsBuild.exe 103 PID 2112 wrote to memory of 5084 2112 rundll32.exe 104 PID 2112 wrote to memory of 5084 2112 rundll32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb7d29709bbc6b756cca7b7dda5658e.exe"C:\Users\Admin\AppData\Local\Temp\adb7d29709bbc6b756cca7b7dda5658e.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main4⤵
- Loads dropped DLL
PID:5084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5084 -s 6445⤵
- Program crash
PID:1968
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1632
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 192 -p 5084 -ip 50841⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD56cd20776123181baa90224db7c78956c
SHA1e840b852ad10fbd825374c9c9b9ef45d673cc7e6
SHA256d1ec02791818eb83a1b7a8b3f98015ed883745f600fe5c1bcf33932c15aa147f
SHA512e8f83e3bea6574b78d37a56c7e31a6731240f8ab33e31b5bf07cedb53ddd10bef41d7322f1af725dd5278e02b95d89f5de9a2c8ddb86e248ab3cdf8db9cb0b8a
-
Filesize
89KB
MD56cd20776123181baa90224db7c78956c
SHA1e840b852ad10fbd825374c9c9b9ef45d673cc7e6
SHA256d1ec02791818eb83a1b7a8b3f98015ed883745f600fe5c1bcf33932c15aa147f
SHA512e8f83e3bea6574b78d37a56c7e31a6731240f8ab33e31b5bf07cedb53ddd10bef41d7322f1af725dd5278e02b95d89f5de9a2c8ddb86e248ab3cdf8db9cb0b8a
-
Filesize
89KB
MD56cd20776123181baa90224db7c78956c
SHA1e840b852ad10fbd825374c9c9b9ef45d673cc7e6
SHA256d1ec02791818eb83a1b7a8b3f98015ed883745f600fe5c1bcf33932c15aa147f
SHA512e8f83e3bea6574b78d37a56c7e31a6731240f8ab33e31b5bf07cedb53ddd10bef41d7322f1af725dd5278e02b95d89f5de9a2c8ddb86e248ab3cdf8db9cb0b8a
-
Filesize
1.1MB
MD55ac4952f9d0b64a682762d2ef24c48dc
SHA182f2776a790774b092a83deefc52440e0d7d6a84
SHA256b73a969f9b129f8e89c49f1697078480af1d922ce10607fe3b851d9f6bb428b3
SHA512e50f33f060c5986dcf4c594d132a56923a4f0926ddd8ff28f8b5435c4998ed9346d17a0bcb815ca5e7e5ab2766baf40940d6810dfddd8512f152c5d55adec2e6
-
Filesize
1.1MB
MD55ac4952f9d0b64a682762d2ef24c48dc
SHA182f2776a790774b092a83deefc52440e0d7d6a84
SHA256b73a969f9b129f8e89c49f1697078480af1d922ce10607fe3b851d9f6bb428b3
SHA512e50f33f060c5986dcf4c594d132a56923a4f0926ddd8ff28f8b5435c4998ed9346d17a0bcb815ca5e7e5ab2766baf40940d6810dfddd8512f152c5d55adec2e6
-
Filesize
1.1MB
MD55ac4952f9d0b64a682762d2ef24c48dc
SHA182f2776a790774b092a83deefc52440e0d7d6a84
SHA256b73a969f9b129f8e89c49f1697078480af1d922ce10607fe3b851d9f6bb428b3
SHA512e50f33f060c5986dcf4c594d132a56923a4f0926ddd8ff28f8b5435c4998ed9346d17a0bcb815ca5e7e5ab2766baf40940d6810dfddd8512f152c5d55adec2e6
-
Filesize
1.1MB
MD55ac4952f9d0b64a682762d2ef24c48dc
SHA182f2776a790774b092a83deefc52440e0d7d6a84
SHA256b73a969f9b129f8e89c49f1697078480af1d922ce10607fe3b851d9f6bb428b3
SHA512e50f33f060c5986dcf4c594d132a56923a4f0926ddd8ff28f8b5435c4998ed9346d17a0bcb815ca5e7e5ab2766baf40940d6810dfddd8512f152c5d55adec2e6