Analysis

  • max time kernel
    157s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 15:39

General

  • Target

    c86a960bc9e16ae974341abd369cf32f_JC.exe

  • Size

    211KB

  • MD5

    c86a960bc9e16ae974341abd369cf32f

  • SHA1

    e8a2547fa7e257297a0d337cbfe407c827ce7c9e

  • SHA256

    2ffb5eb543aaf133c10db110de4691514ce9a4799ba549d2e972d9254c88f3aa

  • SHA512

    b8255831602340314b39b69f7dd49159f6c67521908244ea37375561ac2c00dcc9d3de35a0b86bb3d9a3f989e5197c65b815011c7483cce18cf77719f0886ef1

  • SSDEEP

    3072:EPUHpiKT2t2UHIu05W7SAFJJOUD9cckiKop97f3r8n9t9Ygnt:9rTfUHeeSKOS9ccFKk3Y9t9Y

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c86a960bc9e16ae974341abd369cf32f_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\c86a960bc9e16ae974341abd369cf32f_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\Microsoft Build\Isass.exe

          Filesize

          211KB

          MD5

          c86a960bc9e16ae974341abd369cf32f

          SHA1

          e8a2547fa7e257297a0d337cbfe407c827ce7c9e

          SHA256

          2ffb5eb543aaf133c10db110de4691514ce9a4799ba549d2e972d9254c88f3aa

          SHA512

          b8255831602340314b39b69f7dd49159f6c67521908244ea37375561ac2c00dcc9d3de35a0b86bb3d9a3f989e5197c65b815011c7483cce18cf77719f0886ef1

        • C:\Users\Public\Microsoft Build\Isass.exe

          Filesize

          211KB

          MD5

          c86a960bc9e16ae974341abd369cf32f

          SHA1

          e8a2547fa7e257297a0d337cbfe407c827ce7c9e

          SHA256

          2ffb5eb543aaf133c10db110de4691514ce9a4799ba549d2e972d9254c88f3aa

          SHA512

          b8255831602340314b39b69f7dd49159f6c67521908244ea37375561ac2c00dcc9d3de35a0b86bb3d9a3f989e5197c65b815011c7483cce18cf77719f0886ef1

        • C:\odt\office2016setup.exe

          Filesize

          5.3MB

          MD5

          0f0137052e935b0db07044ab070b2a5a

          SHA1

          821a1be411aac38f04887f625580b43576cf6563

          SHA256

          79cb5355251478b42b816ed24fdd740dfbaecdcdfe61dac0e5975cd76218e31c

          SHA512

          2fa52e194f6773ec04d0dc49892ab628aa0881ead0ec36ba106bf752976f52c552ae341076fd2c8682a7eb415fbae37c4821ef0a3ead1a825be086c91b428c6b

        • memory/1480-6-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/1480-1-0x0000000001CB0000-0x0000000001CB1000-memory.dmp

          Filesize

          4KB

        • memory/1480-0-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-17-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-28-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-10-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-11-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-8-0x0000000001FF0000-0x0000000001FF1000-memory.dmp

          Filesize

          4KB

        • memory/3244-7-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-19-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-22-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-24-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-9-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-32-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-38-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-45-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-46-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-52-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-55-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB

        • memory/3244-64-0x0000000000400000-0x00000000016A8000-memory.dmp

          Filesize

          18.7MB