Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe
Resource
win10v2004-20230915-en
General
-
Target
1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe
-
Size
25KB
-
MD5
3947f2be7e2cdf84176fa74cb637138c
-
SHA1
e06929db4236da54a995763ce138a294cec3f2ed
-
SHA256
1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676
-
SHA512
615056b834e52fd7564dae545923a8997807e094ba099a3d5cf1f49ff55d578cdc594d4be98d568b4966519324155664c1f8ba4a73cfab9dea0eff23cc615600
-
SSDEEP
384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvp:8Q3LotOPNSQVwVVxGKEvKHrVp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" spoolsv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe File created C:\Windows\spoolsv.exe spoolsv.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\onsapay.com\loader spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe Token: SeDebugPrivilege 2520 spoolsv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2520 2096 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe 85 PID 2096 wrote to memory of 2520 2096 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe 85 PID 2096 wrote to memory of 2520 2096 1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe"C:\Users\Admin\AppData\Local\Temp\1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\spoolsv.exe"C:\Windows\spoolsv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5d880f3a811aae648301b89767dc19f5e
SHA10c586269c581efa1d248f10482194d0214b4e165
SHA2560ce250be8f70ff48023f1937ff6b792d6b295310526f09a1f087e3647a14c37b
SHA512fe6f9b13cb7e851959393c3cb8dff0875ebf53ab85bb9b3a94a8d90e9dd2c9bed9b17fc88affba9456c527bdf3061050b94bf9d989f879e7a973f3da1e131e30
-
Filesize
25KB
MD51c8bca26f23a5066dd5b58248d9db725
SHA1be3dfe8cb1743ea52aff34a6ede3557d3cb70ef7
SHA256a44ee43dd5893e363983909dfea12c255ef51e6ed1e05bb88e08080f21e74117
SHA5123b8fadf05c6658ba118e0c6c0a1e847c65dd837245da3fdff265c50332732a9157a919ae7a9c5b6fcb7218ae92da4748de4abc2fc5f6fe622deb719e71eda80b
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb