Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 19:30

General

  • Target

    a6f9ee100615c19f719355bb96b381b92825a3d7fc23aa05e9f8d441a095ebdb.exe

  • Size

    25KB

  • MD5

    ad9ff7aa64eda319128bece3a71f0ca5

  • SHA1

    89b60f90496140c988ed805e68871a3b96936725

  • SHA256

    a6f9ee100615c19f719355bb96b381b92825a3d7fc23aa05e9f8d441a095ebdb

  • SHA512

    3a4e859e1ecf3cff44c8ccf0c554769a21cf5a6d4863e7456d934db82a42051d983233a4a2a90a5af3ed0b233ce3686936b64ed6696bc45484e69a41f0a767e7

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvB:8Q3LotOPNSQVwVVxGKEvKHrVB

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6f9ee100615c19f719355bb96b381b92825a3d7fc23aa05e9f8d441a095ebdb.exe
    "C:\Users\Admin\AppData\Local\Temp\a6f9ee100615c19f719355bb96b381b92825a3d7fc23aa05e9f8d441a095ebdb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    347KB

    MD5

    6060ef636bb02edfa2de3cd9002e23ef

    SHA1

    1103a31dd717685505553a20bf4f139e86616657

    SHA256

    91fd44034fe24457b37f399ad9dfa6d667b9f6577e8058b9860800bf82cea2a9

    SHA512

    0738fa332703f25e8827c6eca5392b3c0b66bab577d7bc1d16ec97bdd898cf9c8159a4897797f5eb55cb1207f7ffd3fa19eb1c5c952ff85c5cf3052e1679bf12

  • C:\Users\Admin\AppData\Local\Temp\EVu4KrEZGxRPzxw.exe

    Filesize

    25KB

    MD5

    450d1b95144905047b917e0bc352e350

    SHA1

    d0b1f9218b7eaf99afa9121d97ea7630f5db737e

    SHA256

    cad249b63f02ffd23b834811789f8653ad3a03947836851c34dd1d70132619f7

    SHA512

    63b7bad39841d47e28394d28197c27895c4b8545b504beff516302aff5bbbe641ef9afb18e0a03ddbb503d16d5548f81f1ffb611ee9ce61730107ff69f6992c8

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb