Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 13:23

General

  • Target

    be22d5ff9e0e3617691e86e25bd7c48259704d575449be9d402eb5ec3b385002.exe

  • Size

    25KB

  • MD5

    989a6d4c1f7ad0403c4ad22f14c8c30a

  • SHA1

    ecf513422851a5aeaff4c675bc7112a1fd307b19

  • SHA256

    be22d5ff9e0e3617691e86e25bd7c48259704d575449be9d402eb5ec3b385002

  • SHA512

    941e2403e75d8d090d77eeb19f5bc3f40a606c6e8450657211083edbf966bb6e0e187d36bb5c0988faa016dd87b4a3dc43d526aee1ba950f4bbd65cb411648dd

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvI:8Q3LotOPNSQVwVVxGKEvKHrVI

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be22d5ff9e0e3617691e86e25bd7c48259704d575449be9d402eb5ec3b385002.exe
    "C:\Users\Admin\AppData\Local\Temp\be22d5ff9e0e3617691e86e25bd7c48259704d575449be9d402eb5ec3b385002.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8mpZEz2qzAOiBTk.exe

    Filesize

    25KB

    MD5

    886d0f4a37c3ed69e5f48217d2cee4d8

    SHA1

    816ab286d6a1cd832d0bcbfd736afb71a6635069

    SHA256

    707d9c2bb91913f8f4bdbb72ee62af74bc9181602b0c764393655c4ba9d54f07

    SHA512

    e11d8080ffd1e37c374ae0a467c3701a2be21beb52643764e237db394f6b0c8d3182a5de5e447ed180d6e69929f2ddc5be4e7325e5ebf0fdda5d088de2108bc6

  • C:\Users\Admin\AppData\Local\Temp\8mpZEz2qzAOiBTk.exe

    Filesize

    25KB

    MD5

    886d0f4a37c3ed69e5f48217d2cee4d8

    SHA1

    816ab286d6a1cd832d0bcbfd736afb71a6635069

    SHA256

    707d9c2bb91913f8f4bdbb72ee62af74bc9181602b0c764393655c4ba9d54f07

    SHA512

    e11d8080ffd1e37c374ae0a467c3701a2be21beb52643764e237db394f6b0c8d3182a5de5e447ed180d6e69929f2ddc5be4e7325e5ebf0fdda5d088de2108bc6

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb