Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 23:48

General

  • Target

    7cbf1dff2703a89dae3bf3a47809d551e3cab01fe040d9d135182a1b04ee71d3.exe

  • Size

    25KB

  • MD5

    787c21a74ea60c4e39585d767ad51a0c

  • SHA1

    1d25d8bf978d745ca7208734541b909dd3abbd58

  • SHA256

    7cbf1dff2703a89dae3bf3a47809d551e3cab01fe040d9d135182a1b04ee71d3

  • SHA512

    e3a79dace03dc02f5b6d62cddb28c51cb570df15c1d52c3865654c4d2172d71ef097e275272274e72de7faf34900bcbc76a34da4f53ab64ddba1ffd63e0d28e7

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvob:8Q3LotOPNSQVwVVxGKEvKHrVY

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cbf1dff2703a89dae3bf3a47809d551e3cab01fe040d9d135182a1b04ee71d3.exe
    "C:\Users\Admin\AppData\Local\Temp\7cbf1dff2703a89dae3bf3a47809d551e3cab01fe040d9d135182a1b04ee71d3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:3540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          347KB

          MD5

          3cc09cabaa30a6d937ae2f793899ed8b

          SHA1

          76cceb4db1beeff6ebbbd8cbdbf8ff9c595912b2

          SHA256

          98b99bea345c21f60f9e989fbc8d7bffeae2bed08ae1e35c950bd38c170cf511

          SHA512

          7d832c00f997ff8d28d08658aa661f4366465e5e6c0b1016f9e9b210ecf722cc510126c09f3e150ddfd18138ee86bd1b281ef1553f7134d3e0366e60b48429a9

        • C:\Users\Admin\AppData\Local\Temp\XAvrhWBEWGEVwe2.exe

          Filesize

          25KB

          MD5

          aa76be1b35d09dc497ba7c430af94a89

          SHA1

          65691a6f828285525e69760bcbb0764136ed3d94

          SHA256

          48218c9df3bd9fed0ed5aedbe1c4082df3d22a16be8ac1a930f54c010f3ed5e9

          SHA512

          b14a09a4b6ccee118a8a2e8b7eca5a4dde93352add977eb8b13e5fb224e08b24ef421ac8acb686b2d8b4a94e0ad75865677c06f2eaec9852262dae62d38d2384

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb