Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 13:05

General

  • Target

    3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe

  • Size

    25KB

  • MD5

    4b8261a668e8b609703769edddcb4c97

  • SHA1

    55850fc5db482729a97926a604761b89b2f4f696

  • SHA256

    3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3

  • SHA512

    a138dc8da89284b3a440b883abc56a3700997cb6ff10ca3ca3b57f22ea807a31bf88f7f7d09e1f73d7d5b129523b180a2e915bb4372f8d84fb7b707db944a5fd

  • SSDEEP

    384:fJ1mIUcCgKY2mPNIrJwIhn7ytQtJUMTNOt894boE9K/mKHboI3:Xm55gKGPNSHftJDhEvKHbo6

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe
    "C:\Users\Admin\AppData\Local\Temp\3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\98W28NGdcgBfCWr.exe

    Filesize

    25KB

    MD5

    b039bcb420ee88b762f2b7f8c00c5aa3

    SHA1

    41ebd2be61251c7f6685fd530a384a4c6830d656

    SHA256

    67858a6e07897ce72e12a999c10397bf2beabdce66fc8ad61a837a9e5590363f

    SHA512

    05ec42cf2ac091154cb09a3de26f44fac624034eaa2c56eb1602d1790e1624562f4f0d11fab37d3733c9177acb1be4ccd9b9cd16327eef06b6c268a441f012c9

  • C:\Users\Admin\AppData\Local\Temp\98W28NGdcgBfCWr.exe

    Filesize

    25KB

    MD5

    b039bcb420ee88b762f2b7f8c00c5aa3

    SHA1

    41ebd2be61251c7f6685fd530a384a4c6830d656

    SHA256

    67858a6e07897ce72e12a999c10397bf2beabdce66fc8ad61a837a9e5590363f

    SHA512

    05ec42cf2ac091154cb09a3de26f44fac624034eaa2c56eb1602d1790e1624562f4f0d11fab37d3733c9177acb1be4ccd9b9cd16327eef06b6c268a441f012c9

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    9ba0942ba2b766b43b832ad20b186324

    SHA1

    4352dd8ee4fcf525400ba6d8cd31ef296f421790

    SHA256

    b788302ea044a0843019e224643d5af1935d420ba716e783b28750b9301c0f4c

    SHA512

    9d485424f423342f6135da72a2e396f6215320cf7849deb3d6a24da0d72b1d3d937a3d6a38023607d8bb760948b5e37c5ff4c743e4246d25c259e5f0ecef6b0b

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    9ba0942ba2b766b43b832ad20b186324

    SHA1

    4352dd8ee4fcf525400ba6d8cd31ef296f421790

    SHA256

    b788302ea044a0843019e224643d5af1935d420ba716e783b28750b9301c0f4c

    SHA512

    9d485424f423342f6135da72a2e396f6215320cf7849deb3d6a24da0d72b1d3d937a3d6a38023607d8bb760948b5e37c5ff4c743e4246d25c259e5f0ecef6b0b