Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2023 21:26

General

  • Target

    1a035dc5b2f5e474e54a529c22586f1ae120280fb428f65fd8c8e2566872a7c2.exe

  • Size

    26KB

  • MD5

    f75b1023f8c395e916a6fb1e33843a75

  • SHA1

    83099b12b993dd8d5eeec108f83ee3e25be028a3

  • SHA256

    1a035dc5b2f5e474e54a529c22586f1ae120280fb428f65fd8c8e2566872a7c2

  • SHA512

    7a11d243c535ad3850eb94ee0ac62c0c1f969d2186e665cfe5b4379bf089251849ac55664994d862a2c0ef1fa758bcb9638d1099f8ce3f167ae82fa0a2ceeabb

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvTLK6:8Q3LotOPNSQVwVVxGKEvKHrVTb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a035dc5b2f5e474e54a529c22586f1ae120280fb428f65fd8c8e2566872a7c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1a035dc5b2f5e474e54a529c22586f1ae120280fb428f65fd8c8e2566872a7c2.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0Nx6lFy4LWVhIiY.exe

    Filesize

    26KB

    MD5

    505c715e3f0a7456256117dd3b8e962a

    SHA1

    626b2b3d338b7242b6c8fa0f3d156a7f78d272d2

    SHA256

    6c87bee37837f47eafa6738c84e4a55483f1a525249d8d9d987a34cb54e08cf4

    SHA512

    24aeb52ba319705b366463b47738acb6f579ffd8dba2e310e5807f54990b6f67bdd6eda38412d3e073db8dc35caf81680d9ddd8019a053b2b50ff0cfc2dc5d6c

  • C:\Users\Admin\AppData\Local\Temp\2462177497\zmstage.exe

    Filesize

    5.1MB

    MD5

    0100916aede3c323c2c1f57b81af0045

    SHA1

    477ef2a265bf2e68b5b65153f5e983f3235880c2

    SHA256

    2e6abe7e3712ac92031a6fefba9b173abca01fabee3af05fb3fa668a6b3ae970

    SHA512

    7c720a86b1d877a5d1eee6ebd3d43e760edb41c32bfb236cea0fc270e06b3a3ae1ff649e264f4dd70924aae714cd46b37dc537a6213494ec4e7360ec61c52439

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb