Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2023, 23:43
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230831-en
General
-
Target
svchost.exe
-
Size
2.2MB
-
MD5
f03dfb589547f36347100634d84b13eb
-
SHA1
962791267c7ef9d478d67bddceab8a8132f0e44a
-
SHA256
3bed0b372700d3421c5833e16585b22f7396d5552fd2ce166ade3f4c4236492b
-
SHA512
fc47e9fd101e54b65ce1211efa3e48d08f2453fd5a506ab1f3587d2b4da802e243d8855f486eedf71ff3ca719da63244fe94a4896fd6002d5a587fec479cd1c1
-
SSDEEP
24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtM:PBozBdhEV7q8bOQnIFWY+3Je0w0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ipinfo.io
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_W0_wE0_aE0_pE0_NL_{00fe4c40-53d1-11ee-a49d-806e6f6e6963}_gruNJIhAym.zip
Filesize1.9MB
MD5530c9960cbb688c008aa931851179d66
SHA126021c8ed5303921a94d546961ca150b571af314
SHA25631443b317b6abc795b6075c386ecff42efdccc0501c72dc3a368be37c9e6ed11
SHA5120bda5ec3cf8958b0a61a4e0f8112e340fd5640a071dbc0f70e03ac73536a0847e6894e730dd6eafe4c1235c60f20fabd0277910f5aa2cea807380eacfb246e3d