Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 21:46

General

  • Target

    2a57d9028a791fb9f4ca3e7561af48fcd8cb5a1d030f5e0aec7274fb3f870033.exe

  • Size

    25KB

  • MD5

    dbfb7dfe6ff755787d0bf86f64c13be9

  • SHA1

    5b74d085a19d4caf0617ddccd1fb06f34a028aeb

  • SHA256

    2a57d9028a791fb9f4ca3e7561af48fcd8cb5a1d030f5e0aec7274fb3f870033

  • SHA512

    10c9278043bd1ef049e1636d80d3f8e2dfd362b69d3c482e394c180e994e0d40d609c5032d92a32e33298d2eba85787706cb76e14094fc0effe9d812dcd9b88a

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvHx:8Q3LotOPNSQVwVVxGKEvKHrVHx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a57d9028a791fb9f4ca3e7561af48fcd8cb5a1d030f5e0aec7274fb3f870033.exe
    "C:\Users\Admin\AppData\Local\Temp\2a57d9028a791fb9f4ca3e7561af48fcd8cb5a1d030f5e0aec7274fb3f870033.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eQcEwtkXFLF7LrE.exe

    Filesize

    450B

    MD5

    8d38860c8442073ace9a3286932ae1dd

    SHA1

    36bb56873751e4c5348abf35c20f68c3e671eec5

    SHA256

    8e57ca2d2f6919522e48527e1c3b1332c469cf3f9c80717d161959ed0ace3679

    SHA512

    8e2bfb56a8ed6689997ebba16c98c58229d59895ec526bb8af12cb1df41c6d034912f2c657bdae34ff8fe64585964f721d875e08eccda0c4c5ab713c77c52cf0

  • C:\Users\Admin\AppData\Local\Temp\eQcEwtkXFLF7LrE.exe

    Filesize

    25KB

    MD5

    21e075ae94f53439c7dc1450f5dcbe71

    SHA1

    5384440725783a6ae09118b323985d8fbd682242

    SHA256

    629b2998fe321e1124ccd7309dea2812ba5a571116932cb2f8bd51b28cfad6dd

    SHA512

    d93dd2c2da71437b3677cc94cbc2fa0f4179cb5390cd9264cd633c4b7d4681e26523b855102fd92a4c1ad685f4b5a5a5f9c5c0a95cd6fd6e7598b9a11420b490

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb