Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 21:22

General

  • Target

    489a624ea613e5cd71837fcd59804124db5faa9f86a3e7790547649b4fcdd1a4.exe

  • Size

    25KB

  • MD5

    ca835c40a948e53a99abe547585b991c

  • SHA1

    cac6d79d0251cbc837f2db4fd00988d5295c4e49

  • SHA256

    489a624ea613e5cd71837fcd59804124db5faa9f86a3e7790547649b4fcdd1a4

  • SHA512

    f81a901d42e5a805c5bc5ddf0145350705d76bee7b532cfcf265413f5dda3201c9fef90b772bc0e487d5410b166516f2343b60c6b6494d86a5d04e2d9c75ae7d

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvh:8Q3LotOPNSQVwVVxGKEvKHrVh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489a624ea613e5cd71837fcd59804124db5faa9f86a3e7790547649b4fcdd1a4.exe
    "C:\Users\Admin\AppData\Local\Temp\489a624ea613e5cd71837fcd59804124db5faa9f86a3e7790547649b4fcdd1a4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TeiUyyP5c6WVWZh.exe

    Filesize

    25KB

    MD5

    297381a0340f11981ee99e779cdc4e96

    SHA1

    da154d4cbc2b0a8531a8a52b9a34fe194248d713

    SHA256

    90daf3ae7eabc539daf9484d7e4727ffbeb3fb633b9e4b2bbb4934b02f1ebf8c

    SHA512

    afd0056e6e5c8cd56d26ae59b5abaee68a66ccd33444578fef0a377413ea9b88debdd157e5948b332947aba4bc67bc8e83a185026326c54b4deacb2551a3093f

  • C:\Users\Admin\AppData\Local\Temp\TeiUyyP5c6WVWZh.exe

    Filesize

    25KB

    MD5

    297381a0340f11981ee99e779cdc4e96

    SHA1

    da154d4cbc2b0a8531a8a52b9a34fe194248d713

    SHA256

    90daf3ae7eabc539daf9484d7e4727ffbeb3fb633b9e4b2bbb4934b02f1ebf8c

    SHA512

    afd0056e6e5c8cd56d26ae59b5abaee68a66ccd33444578fef0a377413ea9b88debdd157e5948b332947aba4bc67bc8e83a185026326c54b4deacb2551a3093f

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb