Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 17:08

General

  • Target

    1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe

  • Size

    25KB

  • MD5

    3947f2be7e2cdf84176fa74cb637138c

  • SHA1

    e06929db4236da54a995763ce138a294cec3f2ed

  • SHA256

    1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676

  • SHA512

    615056b834e52fd7564dae545923a8997807e094ba099a3d5cf1f49ff55d578cdc594d4be98d568b4966519324155664c1f8ba4a73cfab9dea0eff23cc615600

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvp:8Q3LotOPNSQVwVVxGKEvKHrVp

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe
    "C:\Users\Admin\AppData\Local\Temp\1eaa13aa919cdc02445c27ebe6dee56083b292bf6df432f3a97278265dd39676.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    347KB

    MD5

    d880f3a811aae648301b89767dc19f5e

    SHA1

    0c586269c581efa1d248f10482194d0214b4e165

    SHA256

    0ce250be8f70ff48023f1937ff6b792d6b295310526f09a1f087e3647a14c37b

    SHA512

    fe6f9b13cb7e851959393c3cb8dff0875ebf53ab85bb9b3a94a8d90e9dd2c9bed9b17fc88affba9456c527bdf3061050b94bf9d989f879e7a973f3da1e131e30

  • C:\Users\Admin\AppData\Local\Temp\9llVK6W1oaOZiny.exe

    Filesize

    25KB

    MD5

    1c8bca26f23a5066dd5b58248d9db725

    SHA1

    be3dfe8cb1743ea52aff34a6ede3557d3cb70ef7

    SHA256

    a44ee43dd5893e363983909dfea12c255ef51e6ed1e05bb88e08080f21e74117

    SHA512

    3b8fadf05c6658ba118e0c6c0a1e847c65dd837245da3fdff265c50332732a9157a919ae7a9c5b6fcb7218ae92da4748de4abc2fc5f6fe622deb719e71eda80b

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb