Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2023 01:58

General

  • Target

    b2723185f7cca48df2c71d53bba03995430178a92e27118c3be86dc81c8f69cb.exe

  • Size

    25KB

  • MD5

    85e5bdbe07530f068811ff291d7bdb3d

  • SHA1

    f68ad2e6749a41d5b18b85eb739916c8ac791053

  • SHA256

    b2723185f7cca48df2c71d53bba03995430178a92e27118c3be86dc81c8f69cb

  • SHA512

    43afbb488fe78fa65342033394d6e443bb273b33ad83d493ae883bd23d4f7c159cce443cc7737f4229ac040801f763c5b993add1b3d45e4c611f6cf978d26b29

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvq:8Q3LotOPNSQVwVVxGKEvKHrVq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2723185f7cca48df2c71d53bba03995430178a92e27118c3be86dc81c8f69cb.exe
    "C:\Users\Admin\AppData\Local\Temp\b2723185f7cca48df2c71d53bba03995430178a92e27118c3be86dc81c8f69cb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F4QfaiV1wVXnNw6.exe

    Filesize

    25KB

    MD5

    ca3c96ef53338d37eb5a88c38f471143

    SHA1

    9f5fe23ef2e451f33b34d5caaf0e904ddd61dc99

    SHA256

    e8470bcb24e6fe51037efaa096dfeb45d41e99720375a10fae76bdd2cb037f6c

    SHA512

    c33589bcd4ee3b31707c2480acb913e5833e381a2a240270d9bdcf0b2a44211a8e0fc496c1b7c4bfb9497d853534696c29571b4e665b1ff115e8b88acc485e6d

  • C:\Users\Admin\AppData\Local\Temp\F4QfaiV1wVXnNw6.exe

    Filesize

    25KB

    MD5

    ca3c96ef53338d37eb5a88c38f471143

    SHA1

    9f5fe23ef2e451f33b34d5caaf0e904ddd61dc99

    SHA256

    e8470bcb24e6fe51037efaa096dfeb45d41e99720375a10fae76bdd2cb037f6c

    SHA512

    c33589bcd4ee3b31707c2480acb913e5833e381a2a240270d9bdcf0b2a44211a8e0fc496c1b7c4bfb9497d853534696c29571b4e665b1ff115e8b88acc485e6d

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb