Resubmissions

10-08-2023 13:02

230810-p92wxach32 8

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2023 13:02

General

  • Target

    24bd790bc9427021121ec0e318db93369c2d893e40309f7083f178d3a5819161.exe

  • Size

    419KB

  • MD5

    d811a57bc0e8b86b449277f9ffb50cc9

  • SHA1

    cdab34eea2dfd5e96412e34c0b3eb090a9661377

  • SHA256

    24bd790bc9427021121ec0e318db93369c2d893e40309f7083f178d3a5819161

  • SHA512

    5b569f0cebdc006125ac37ee0e333a22a35189214b5c2ab05671e7c307936c1d121a9afd7c48ce5283435c755d82110ce70adffd4e20570c3d4f4680962a7dfa

  • SSDEEP

    12288:ZvtSEEuEE3EEMEEzEE5EEOEEmEEAEE2EE6EE3EERhXz+MbfR1nYm4BJ1B4ywtT5m:Zvtk

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24bd790bc9427021121ec0e318db93369c2d893e40309f7083f178d3a5819161.exe
    "C:\Users\Admin\AppData\Local\Temp\24bd790bc9427021121ec0e318db93369c2d893e40309f7083f178d3a5819161.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6145debf301338b4603ef57e4f8b2655

    SHA1

    d2bbddf0b817b91b7f3b33930c1203518b1cf0d7

    SHA256

    3a437a17f43a4aff4ae6a1e119b37647379c10df5003eeb349449e96a1bb176c

    SHA512

    1f4c53eac5c8c6b73bba63511ed6cc438ce256ee4c976b9378a9ac2877b583580daf326ef3d4f7b800b8f29ce21fb0a5228fe77632046a3de400f1c06968adf6

  • C:\Users\Admin\AppData\Local\Temp\Cab8326.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar83C5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • \Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

    Filesize

    384KB

    MD5

    55c797383dbbbfe93c0fe3215b99b8ec

    SHA1

    1b089157f3d8ae64c62ea15cdad3d82eafa1df4b

    SHA256

    5fac5a9e9b8bbdad6cf661dbf3187e395914cd7139e34b725906efbb60122c0d

    SHA512

    648a7da0bcda6ccd31b4d6cdc1c90c3bc3c11023fcceb569f1972b8f6ab8f92452d1a80205038edcf409669265b6756ba0da6b1a734bd1ae4b6c527bbebb8757

  • \Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

    Filesize

    384KB

    MD5

    55c797383dbbbfe93c0fe3215b99b8ec

    SHA1

    1b089157f3d8ae64c62ea15cdad3d82eafa1df4b

    SHA256

    5fac5a9e9b8bbdad6cf661dbf3187e395914cd7139e34b725906efbb60122c0d

    SHA512

    648a7da0bcda6ccd31b4d6cdc1c90c3bc3c11023fcceb569f1972b8f6ab8f92452d1a80205038edcf409669265b6756ba0da6b1a734bd1ae4b6c527bbebb8757

  • \Users\Admin\AppData\Local\Temp\x86\SQLite.Interop.dll

    Filesize

    1.3MB

    MD5

    8be215abf1f36aa3d23555a671e7e3be

    SHA1

    547d59580b7843f90aaca238012a8a0c886330e6

    SHA256

    83f332ea9535814f18be4ee768682ecc7720794aedc30659eb165e46257a7cae

    SHA512

    38cf4aea676dacd2e719833ca504ac8751a5fe700214ff4ac2b77c0542928a6a1aa3780ed7418387affed67ab6be97f1439633249af22d62e075c1cdfdf5449b

  • memory/2196-57-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2196-54-0x00000000008B0000-0x0000000000920000-memory.dmp

    Filesize

    448KB

  • memory/2196-56-0x0000000000760000-0x000000000077A000-memory.dmp

    Filesize

    104KB

  • memory/2196-130-0x0000000004BC0000-0x0000000004C22000-memory.dmp

    Filesize

    392KB

  • memory/2196-55-0x0000000074610000-0x0000000074CFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2196-135-0x0000000004B50000-0x0000000004B70000-memory.dmp

    Filesize

    128KB

  • memory/2196-180-0x0000000004C40000-0x0000000004C80000-memory.dmp

    Filesize

    256KB

  • memory/2196-184-0x0000000074610000-0x0000000074CFE000-memory.dmp

    Filesize

    6.9MB