Resubmissions
22/12/2023, 10:03
231222-l3e7safdhj 822/12/2023, 08:56
231222-kv19lsgab9 714/08/2023, 12:27
230814-pmrsesca25 7Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/08/2023, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume1/Users/RinuThomas/Documents/Rkays office/PAAET/transas 01-2013 mfc & tgs/david.exe
Resource
win7-20230712-en
General
-
Target
Device/HarddiskVolume1/Users/RinuThomas/Documents/Rkays office/PAAET/transas 01-2013 mfc & tgs/david.exe
-
Size
5.8MB
-
MD5
8b15eb749457b601495c87f465c525f4
-
SHA1
13ddfa1862b74bdbbc06fc8766b36b9b73b25760
-
SHA256
3b61ce3d5d75fe4a90313741cdfa71c47ba6543fc568ab3293ed33983ff717d8
-
SHA512
370692e5d36d3fe4d4f42cd3d5d00987b54ca834582b6668f30d44beba1540ad1aa31f2429d0aac0350465b53e72f8ffc67ac459005b7f2a585e4219d4b2022f
-
SSDEEP
98304:JlN/A476UGGtP3G0FWPuJeXIWPafmioWzyN52lop0vBmL+1fKdqFT0CHVHkVE29L:JH/6UGGRGUeuoXI/mioWzm5u2gcL+tFe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1568 ApnStub.exe -
Loads dropped DLL 6 IoCs
pid Process 2780 david.exe 1568 ApnStub.exe 1568 ApnStub.exe 2780 david.exe 2780 david.exe 2780 david.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2780 david.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1568 2780 david.exe 28 PID 2780 wrote to memory of 1568 2780 david.exe 28 PID 2780 wrote to memory of 1568 2780 david.exe 28 PID 2780 wrote to memory of 1568 2780 david.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\Users\RinuThomas\Documents\Rkays office\PAAET\transas 01-2013 mfc & tgs\david.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\Users\RinuThomas\Documents\Rkays office\PAAET\transas 01-2013 mfc & tgs\david.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\ApnStub.exe"C:\Users\Admin\AppData\Local\Temp\ApnStub.exe" /tb=IMB2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5197215658b8015182192e1ebca3bbcc3
SHA140e49124ad0b55a25f947333ca88e9d0bc30a7e3
SHA25608db125c09eb53cc28e7bc7c427b6c2217ff6134a122e6d65d1d24f70e875d9e
SHA5125fe9d6c96c817bd64ea78ff511734e9e11e6ca13b4506b589156a801fa4fed568c37d958cfafb96ad86ee1229ceeb35165965cb776f3a74cafaedb1a946bbf79
-
Filesize
139KB
MD5c36923084822c017f69396418a999d39
SHA1fdc2005ced8acf86c68fe1b86b0698d0539e8ce0
SHA2567a158fdeea8f7107be5ce40242546a503193aa1c278f74a4730871b8edd0ba76
SHA512fb1106d4f4a138cad28a4282cb00c72688e03610be1d31a7cdd7b42b23e00e4f7ca9e731a7ab016d5920411707e165e3ee48164ef520112d8ac36fad85749c44
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
497B
MD58ab8f4a03e5779118e69aa828d2eb494
SHA1d6105a83efa5d28a2ed0cf6dac14ed058b724358
SHA256e2aa73d91b0f7f66b707fbc7c8f44ca0935cc0bc712ff11a40d22ecb89f4c182
SHA512ef8d784a32082194a742af0c3eb6cda1cdb94c23fa35f25ffc056b0c0d6cf77a5576d1fcdfe58df375bfae9a58ae5598d2c7a3d369669094c96083accc400d65
-
Filesize
536B
MD5ada4e582275d96fc68eaeecbed39545d
SHA1ec1bb9eb90916a16135233db0f2181bd228419ee
SHA2569211691d1dc22003fec8b754e01864a7fa4627e1e77bf274e87d7f6e0f07244c
SHA5127b6cf824cebb830d63ede6439fc78cf7d077c09d4e79401dc30f0f41efdf17c8fd93c665887dd0938d58a49eaa64cbd46f2e22fc2e5917b27a1ceebb5b300f54
-
Filesize
240KB
MD5197215658b8015182192e1ebca3bbcc3
SHA140e49124ad0b55a25f947333ca88e9d0bc30a7e3
SHA25608db125c09eb53cc28e7bc7c427b6c2217ff6134a122e6d65d1d24f70e875d9e
SHA5125fe9d6c96c817bd64ea78ff511734e9e11e6ca13b4506b589156a801fa4fed568c37d958cfafb96ad86ee1229ceeb35165965cb776f3a74cafaedb1a946bbf79
-
Filesize
240KB
MD5197215658b8015182192e1ebca3bbcc3
SHA140e49124ad0b55a25f947333ca88e9d0bc30a7e3
SHA25608db125c09eb53cc28e7bc7c427b6c2217ff6134a122e6d65d1d24f70e875d9e
SHA5125fe9d6c96c817bd64ea78ff511734e9e11e6ca13b4506b589156a801fa4fed568c37d958cfafb96ad86ee1229ceeb35165965cb776f3a74cafaedb1a946bbf79
-
Filesize
139KB
MD5c36923084822c017f69396418a999d39
SHA1fdc2005ced8acf86c68fe1b86b0698d0539e8ce0
SHA2567a158fdeea8f7107be5ce40242546a503193aa1c278f74a4730871b8edd0ba76
SHA512fb1106d4f4a138cad28a4282cb00c72688e03610be1d31a7cdd7b42b23e00e4f7ca9e731a7ab016d5920411707e165e3ee48164ef520112d8ac36fad85749c44
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f