Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 13:23

General

  • Target

    537aebdeec02a576049970e7e09272256325580066afa6aaf78886ea4bf779ea.exe

  • Size

    25KB

  • MD5

    854a692300b867c8a833e87f60843eff

  • SHA1

    de8cdca747efab14edeec17fc71d3111592f44aa

  • SHA256

    537aebdeec02a576049970e7e09272256325580066afa6aaf78886ea4bf779ea

  • SHA512

    50acb85c7cd317b9cbef9efdd478cd6ad45ba0bdb9588d6cf209d073c239f30ad49f7338e4f8fefe7785aed657d9d20d5e4d946b6e53e78ba158b83af752ab0d

  • SSDEEP

    384:KnTBn5ksyDKVH2PNInugsTHTixQYucSJcO9d+biE9K/mKHT1z0:KBnyZDKMPN+wDYucG9EvKHTC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\537aebdeec02a576049970e7e09272256325580066afa6aaf78886ea4bf779ea.exe
    "C:\Users\Admin\AppData\Local\Temp\537aebdeec02a576049970e7e09272256325580066afa6aaf78886ea4bf779ea.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GsUvGGaQcy67TM3.exe

    Filesize

    25KB

    MD5

    83f058970a44d4a443ce514f3da55167

    SHA1

    3c0f42af5f51dbe0b6f877398d22155a7378155f

    SHA256

    e0380c1241a678b451bb3093a614c729f81e94c3046ae3d84be5b962dd3440bb

    SHA512

    1c9fbca45769924de26e490f1d27aa57ecf3b9a8d2407716ddca15c5c31650bb0a59b9f47c4363d212825ee8976e4a443139d84d5e2dbc0ac1a19a927ab0b489

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    a1211ced2ed68ff60b804ccd12971b22

    SHA1

    48a9490672c5dcc2e06ca345bc6116107b60f673

    SHA256

    25595722313f14e0e90b11aa0efee287f11d36138bd3466443798e55211298f5

    SHA512

    1d63e09ed2c817528b196fed7d8c2bee7a0fb4ef965d48d70129338997b8eaa4c284a2b6661a71dc3a9f0601cdd2e7ef92e0c7499f89aa8385e15d3022898f7f

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    a1211ced2ed68ff60b804ccd12971b22

    SHA1

    48a9490672c5dcc2e06ca345bc6116107b60f673

    SHA256

    25595722313f14e0e90b11aa0efee287f11d36138bd3466443798e55211298f5

    SHA512

    1d63e09ed2c817528b196fed7d8c2bee7a0fb4ef965d48d70129338997b8eaa4c284a2b6661a71dc3a9f0601cdd2e7ef92e0c7499f89aa8385e15d3022898f7f