Analysis
-
max time kernel
104s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2023 07:22
Static task
static1
Behavioral task
behavioral1
Sample
.............exe
Resource
win7-20230712-en
General
-
Target
.............exe
-
Size
3.9MB
-
MD5
1c9d03acc5ce4d1565e01418e2892087
-
SHA1
345be215d0017d06a3934150105389730038fa69
-
SHA256
bdb03d50cba10bbbaea2409521c515d15f3e674e6ccabbadfec319bdc08cd1ea
-
SHA512
1442ad0b3af4fddc1c6980426a25f6d2c4b033902b8cc42596ad0077385ca3d56e4fed4517a61fe4d5b5b185b34030196ac9c5dcc61d93fd48292aed2b7998e8
-
SSDEEP
49152:gnHn5pXUXb6c9YuoHjAbDiYFpIDckO4iNQxgei6HQR9sXafgkDFMVR9C1UhPJXMS:45pEXOc9AH8FpQrDgeJrBiCV2HXq
Malware Config
Signatures
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
Processes:
.............exedescription ioc process File created C:\Program Files (x86)\0E579E15.log .............exe -
Loads dropped DLL 1 IoCs
Processes:
.............exepid process 4580 .............exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
.............exepid process 4580 .............exe 4580 .............exe 4580 .............exe 4580 .............exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
.............exedescription pid process Token: SeShutdownPrivilege 4580 .............exe Token: SeCreatePagefilePrivilege 4580 .............exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
.............exepid process 4580 .............exe 4580 .............exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\.............exe"C:\Users\Admin\AppData\Local\Temp\.............exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4580
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\1498f5c051d947bb8f80f2984dc47386 /t 4432 /p 45801⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1011KB
MD57d900a78879abc427d67533fea28a2bb
SHA1db0632d5db8edc354922b32c5b948eac44a86fdc
SHA256b4eba257269060b9ee20c0c24d943d31d81a6da7b26c33c2ffac311a977d5404
SHA512af35d6f02d92c76913a2787df1b4f6f1f7800ad4ed1d7c692b270b2a576e991675df75932995fd1136a9ab4f6911325be4cc2733b7304546fd4a87c75fd38b73
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
6KB
MD59b27e2a266fe15a3aabfe635c29e8923
SHA1403afe68c7ee99698c0e8873ce1cd424b503c4c8
SHA256166aa42bc5216c5791388847ae114ec0671a0d97b9952d14f29419b8be3fb23f
SHA5124b07c11db91ce5750d81959c7b2c278ed41bb64c1d1aa29da87344c5177b8eb82d7d710b426f401b069fd05062395655d985ca031489544cdf9b72fe533afa61
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c