Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-08-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe
Resource
win7-20230712-en
General
-
Target
4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe
-
Size
1.2MB
-
MD5
6183ba3237a79b64eee7d174cf1054ef
-
SHA1
d3d76a213f62c2da7e09d7ae2c09d6ccc08c2450
-
SHA256
4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a
-
SHA512
02b9f5379090d21e93e30e13307d71073df85483c96eebac8fc82d45de8f321d4d506ccc4acf67c60b0c26fb09ac342bb4f97dd93288b39c08f233916af9e078
-
SSDEEP
24576:1XU09t8XLX8hf6VAYCG6WouT8wakojp09TPFpae7QknE:1EutzfsCG5h9akoj+vae8kn
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 928 powercfg.exe Token: SeShutdownPrivilege 2664 powercfg.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2724 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 30 PID 1788 wrote to memory of 2724 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 30 PID 1788 wrote to memory of 2724 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 30 PID 1788 wrote to memory of 2724 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 30 PID 2724 wrote to memory of 928 2724 cmd.exe 32 PID 2724 wrote to memory of 928 2724 cmd.exe 32 PID 2724 wrote to memory of 928 2724 cmd.exe 32 PID 2724 wrote to memory of 928 2724 cmd.exe 32 PID 1788 wrote to memory of 3024 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 33 PID 1788 wrote to memory of 3024 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 33 PID 1788 wrote to memory of 3024 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 33 PID 1788 wrote to memory of 3024 1788 4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe 33 PID 3024 wrote to memory of 2664 3024 cmd.exe 35 PID 3024 wrote to memory of 2664 3024 cmd.exe 35 PID 3024 wrote to memory of 2664 3024 cmd.exe 35 PID 3024 wrote to memory of 2664 3024 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe"C:\Users\Admin\AppData\Local\Temp\4270afcad72547081c6bc723c323cc096fe12a1eb4e6aabff0aeacb21502f98a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C powercfg -x -monitor-timeout-ac 02⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\powercfg.exepowercfg -x -monitor-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C powercfg -change -standby-timeout-ac 02⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\powercfg.exepowercfg -change -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
664B
MD5d7b405d844bf2c4b060ca5e150b4a5a2
SHA1cd5293c445722c1718529d96a5cadafc82b02932
SHA256da5d018d7c64afb391151680e5e79478d1cbbb875bc1c5e3be03efdd8f7b1d3d
SHA5128bc3b0e4d037ed6add976717a74fb98cea7e3140abcb0f8ab016fc8833c51c8452bbfb0b7778be62de39be79ae88077f48c8d2ddc4fc5f20cb3e2342f832ef92
-
Filesize
2KB
MD56c898fa48cbf4fde048878e64d1763af
SHA13cc2a1878a643ca3155951b36908e627de110746
SHA256f5327ba2a1497bc2aee16e635f20fc65ff82d48b776471de70c334611777165c
SHA5126c44230b1a9ff22528e5cf7fe646843f7c612b14fedb0f388601e501119dcfcd4bc0f96b85a6de8d51fb8460e15160a1a341ac518ce9639a79b94ad545697682
-
Filesize
75B
MD5a71773639c751022e1f6da6cab72a0a6
SHA16d5919a00aede2e8db1c49f9303482de20a0fde3
SHA256fe6f9409fd3d21e6def35cba73ee4ccf607856a2cd371d7fabdb5b96fc6373a0
SHA51289e7eaa35d05f8ed3943753e91455c7c4e351b0c6cb890563be9757750fa723d6da2daa2acb673d1a132592343da08195f5a5424014b0fde372f789000107291