Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 20:04

General

  • Target

    70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe

  • Size

    1.5MB

  • MD5

    ece53f756522240e016186d141321d25

  • SHA1

    8e8a7e24240373d867b94db9af05b760e81309af

  • SHA256

    70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a

  • SHA512

    a392e2ebf074decc93136f356eae11c8bbef66307d5987f739736e14ac73a783b558286420093c635bcd10bc29ce22fc505e4e8b4afa5ba1ca7b4fb14d716456

  • SSDEEP

    24576:GM7CKVVVMxPcROUnuXGJYybQ56dOA/85RkV4lN/ZLqg/YmrkjeWz:1AseGJPQ0OAUfkVyN/ZLCMkj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe
    "C:\Users\Admin\AppData\Local\Temp\70a2b4ab4c4f4f8027aafc3f2cfdefa959830222205b93d36dfc7429f5e4be3a.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp
      C:\Users\Admin\AppData\Local\Temp\7D2F.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4904
    • C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_66" -vma LWNsYXNzcGF0aABDOlxQcm9ncmFtIEZpbGVzXEphdmFcanJlMS44LjBfNjZcbGliXGRlcGxveS5qYXIALURqYXZhLnNlY3VyaXR5LnBvbGljeT1maWxlOkM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF82NlxsaWJcc2VjdXJpdHlcamF2YXdzLnBvbGljeQAtRHRydXN0UHJveHk9dHJ1ZQAtWHZlcmlmeTpyZW1vdGUALURqbmxweC5ob21lPUM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF82NlxiaW4ALURqYXZhLnNlY3VyaXR5Lm1hbmFnZXIALURzdW4uYXd0Lndhcm11cD10cnVlAC1YYm9vdGNsYXNzcGF0aC9hOkM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF82NlxsaWJcamF2YXdzLmphcjtDOlxQcm9ncmFtIEZpbGVzXEphdmFcanJlMS44LjBfNjZcbGliXGRlcGxveS5qYXI7QzpcUHJvZ3JhbSBGaWxlc1xKYXZhXGpyZTEuOC4wXzY2XGxpYlxwbHVnaW4uamFyAC1EamRrLmRpc2FibGVMYXN0VXNhZ2VUcmFja2luZz10cnVlAC1Eam5scHguanZtPUM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF82NlxiaW5camF2YXcuZXhlAC1Eam5scHgudm1hcmdzPUxVUnFaR3N1WkdsellXSnNaVXhoYzNSVmMyRm5aVlJ5WVdOcmFXNW5QWFJ5ZFdVQQ== -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh
        3⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp

    Filesize

    50B

    MD5

    e72c1452d979cb12984e5579ba3d6cef

    SHA1

    d858ce5bdfe5ae0001c76116496ad5378659c145

    SHA256

    307cf2ff788446c1fd7bf870c6de07d496cf25f2e04e1c67c1f138a792cac954

    SHA512

    8609dcc6fa7a8df43f5ec8a645ca4160b17efd25d24bbcce723969746307ad470bab8a1ab179ab2cc87346f7e7a8ef6edd3a4e84f69ed3b0fe98881b83c3c114

  • C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.properties

    Filesize

    698B

    MD5

    3dc581d5b23ce5f46c6146486e8a5ba8

    SHA1

    2b93eebbd113bfccd484346a0da3da2dbd21f1f2

    SHA256

    f356eb956501ff91cd5fbff69d337704ab7b496afa88e548df822c118e03c05c

    SHA512

    eb10b3d72461719c287b5c27226fcecdf0a98fbdeb6cbd1d65c26250d7c7e4396f0769c00544080ba20c2a3fa051bf58c2de2a4bdbebb7bed54d01b28deb0e7a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7R28S588\common[1]

    Filesize

    1KB

    MD5

    f5bb484d82e7842a602337e34d11a8f6

    SHA1

    09ea1dee4b7c969771e97991c8f5826de637716f

    SHA256

    219108bfef63f97562c4532681b03675c9e698c5ae495205853dbcbfd93faf1a

    SHA512

    a23cc05b94842e1f3a53c2ea8a0b78061649e0a97fcd51c8673b2bcb6de80162c841e9fdde212d3dfd453933df2362dcb237fe629f802bafaa144e33ca78b978

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7R28S588\l10n[1]

    Filesize

    4KB

    MD5

    1fd5111b757493a27e697d57b351bb56

    SHA1

    9ca81a74fa5c960f4e8b3ad8a0e1ec9f55237711

    SHA256

    85bbec802e8624e7081abeae4f30bd98d9a9df6574bd01fe5251047e8fdaf59f

    SHA512

    80f532e4671d685fa8360ef47a09efcb3342bcfcf929170275465f9800bfbfffc35728a1ba496d4c04a1fdefb2776af02262c3774f83fea289585a5296d560b0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GJQPG6SR\auwelcome_en[1]

    Filesize

    975B

    MD5

    89f6511366c1bcfee77d354fa17e6f75

    SHA1

    231e2ec9ca5873bdd3e2ff94947fe6342ff046e0

    SHA256

    d84f6975371b7b3f8b17e14a1eaf161d29504788355859e9513ae39c3cd8188e

    SHA512

    5bdc1414acc16d5f1d4d1f93d81d546740aa98143efcd9613eb0d53f9253bde65dc4d9ee20499a67c30a6f21bdc7165f006bbf2cf436a52967cd78262148f0b5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GJQPG6SR\host[1]

    Filesize

    1KB

    MD5

    a752a4469ac0d91dd2cb1b766ba157de

    SHA1

    724ae6b6d6063306cc53b6ad07be6f88eaffbab3

    SHA256

    1e67043252582aea0e042f5a7be4a849b7cd01b133a489c3b2e67c10ade086f3

    SHA512

    abc2899705a23f15862acf3d407b700bb91c545722c02c7429745ab7f722507285c62614dcb87ea846f88fc0779345cb2e22dc3ad5f8113f6907821505be2c02

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GJQPG6SR\rtutils[1]

    Filesize

    244B

    MD5

    c0a4cebb2c15be8262bf11de37606e07

    SHA1

    cafc2ccb797df31eecd3ae7abd396567de8e736d

    SHA256

    7da9aa32aa10b69f34b9d3602a3b8a15eb7c03957512714392f12458726ac5f1

    SHA512

    cc68f4bc22601430a77258c1d7e18d6366b6bf8f707d31933698b2008092ba5348c33fa8b03e18c4c707abf20ce3cbcb755226dc6489d2b19833809c98a11c74

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HEITGDYC\masthead_fill[1]

    Filesize

    1KB

    MD5

    91a7b390315635f033459904671c196d

    SHA1

    b996e96492a01e1b26eb62c17212e19f22b865f3

    SHA256

    155d2a08198237a22ed23dbb6babbd87a0d4f96ffdc73e0119ab14e5dd3b7e00

    SHA512

    b3c8b6f86ecf45408ac6b6387ee2c1545115ba79771714c4dd4bbe98f41f7034eae0257ec43c880c2ee88c44e8fc48c775c5bb4fd48666a9a27a8f8ac6bcfdcb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HEITGDYC\runtime[1]

    Filesize

    42KB

    MD5

    6c5474ad99d878e6b1cd24637489365c

    SHA1

    1737d292e967fe7827f77784733a570979c3243d

    SHA256

    b5136042c9eff11637305b4d81302c847c48850bbbca3c2c8ede3fe33467ea58

    SHA512

    0164a8105bbb23c8384d3547b38bab31e0f754eb1acd2d15a50702b279282cdbd4ebbf79b7d5e2e0073fcb24f24a29dfd2ec88da85c674a176ec69ae8cf156d2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XE9C1B9R\auwelcome[1]

    Filesize

    3KB

    MD5

    b7cda1f5ab4cd32381f522d8680897f9

    SHA1

    e20623be30c92f0c483520c589fa9d617d7a0fea

    SHA256

    f264387739979a9e8683682ced5b539211b051f3d8d6b3b5fa6912efbb8591a4

    SHA512

    e71fe1d527d9306322db91ac600d83c59e9e8fedefb9a43d474c31bf5eb11ab440d8e47f74af0aa416f35311144fb9412af2be91140af962576da6c39dcf9918

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XE9C1B9R\layout[1]

    Filesize

    2KB

    MD5

    cc86b13a186fa96dfc6480a8024d2275

    SHA1

    d892a7f06dc12a0f2996cc094e0730fe14caf51a

    SHA256

    fab91ced243da62ec1d938503fa989462374df470be38707fbf59f73715af058

    SHA512

    0e3e4c9755aa8377e00fc9998faab0cd839dfa9f88ce4f4a46d8b5aaf7a33e59e26dbf55e9e7d1f8ef325d43302c68c44216adb565913d30818c159a182120fc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XE9C1B9R\masthead_left[1]

    Filesize

    4KB

    MD5

    b663555027df2f807752987f002e52e7

    SHA1

    aef83d89f9c712a1cbf6f1cd98869822b73d08a6

    SHA256

    0ce32c034dfb7a635a7f6e8152666def16d860b6c631369013a0f34af9d17879

    SHA512

    b104ed3327fed172501c5aa990357b44e3b31bb75373fb8a4ea6470ee6a72e345c9dc4bcf46a1983c81adb567979e6e8e6517d943eb204c3f7fac559cd17c451

  • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\au-descriptor-1.8.0_381-b09.xml

    Filesize

    6KB

    MD5

    bbc63cd248c5cb385a502cbbe9106fac

    SHA1

    2fff4bb372ee34489cc376ee060cd43341d5c6f5

    SHA256

    152f94d05078094ffb65e55d4d32992c2e30208c8e43f46cc5b56ae44f921216

    SHA512

    e70bd01b49bc78518fd1dad447780236549db5d41b0a9fc9314d6828989db91288da1ecc9bc00ff86b8bfea69fc85e72a5b3aab06f9c02d1335fa91ed504940c

  • C:\Users\Admin\AppData\Local\Temp\hs_err_pid4912.log

    Filesize

    22KB

    MD5

    8b158e28c42a7d2b23f439eb4c630de1

    SHA1

    d55596f7af11b8291b25e264b846b09a7ca5c92d

    SHA256

    90f1298f6afb03de8e5018272909cc9afc8eda7b018226f92e87e255d6656952

    SHA512

    7a17d82c5e3c16578bc5650bf063f28b501db65e4409922bf2195a796ba139d56c21a3ef894460179f329ae371f8dcf3cef425bb9e6d6583e8852db97d738c3a

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    267KB

    MD5

    2caaa4747e7d8abe4bb9ead739ae319e

    SHA1

    c2f18fdca0f7b0d5baba10c27b5a06f5f8ccdc79

    SHA256

    ac0ecd1f673bca8cfd528a4fc4e23fd0d3d7050219532cd665a475564057098d

    SHA512

    37823f14c09f5759c784be2a5ed763b9e31da5ae8175779d5d4fa686e2c5e69bddd243ba775b6d6652c0071c4136010b9cc142ccf33460d1cee1a19d146fbbb5

  • C:\Users\Admin\AppData\Local\Temp\jusched.log

    Filesize

    318KB

    MD5

    c47c47d6ca46714421000c53bbf693ed

    SHA1

    ad1f3205551abb8035fc1bf260d4fb3126f380a4

    SHA256

    7e358230f195bc32ae6fa7664962d48fa3d3a9fcd7210384e299fafbd6e17391

    SHA512

    76f550eff2c31c5286a9409249e8b8d2c0b65c82708069ba9413ab6a7507e2f06a6aa710ebe92056e3575fc7ac690d8d3ff82a0aff19182e88a9eb9466ec7e4d

  • memory/2000-0-0x0000000002300000-0x000000000234F000-memory.dmp

    Filesize

    316KB

  • memory/2000-1-0x0000000002300000-0x000000000234F000-memory.dmp

    Filesize

    316KB

  • memory/4912-295-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4912-334-0x00000000051A0000-0x00000000051B0000-memory.dmp

    Filesize

    64KB

  • memory/4912-336-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-335-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4912-337-0x00000000051C0000-0x00000000051D0000-memory.dmp

    Filesize

    64KB

  • memory/4912-341-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-333-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/4912-332-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/4912-331-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB

  • memory/4912-330-0x0000000005190000-0x00000000051A0000-memory.dmp

    Filesize

    64KB

  • memory/4912-329-0x0000000005130000-0x0000000005140000-memory.dmp

    Filesize

    64KB

  • memory/4912-327-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4912-328-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-321-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-315-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4912-312-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-289-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB

  • memory/4912-280-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4912-57-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/4912-46-0x0000000004E80000-0x0000000005E80000-memory.dmp

    Filesize

    16.0MB