Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe
Resource
win10v2004-20230915-en
General
-
Target
3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe
-
Size
25KB
-
MD5
4b8261a668e8b609703769edddcb4c97
-
SHA1
55850fc5db482729a97926a604761b89b2f4f696
-
SHA256
3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3
-
SHA512
a138dc8da89284b3a440b883abc56a3700997cb6ff10ca3ca3b57f22ea807a31bf88f7f7d09e1f73d7d5b129523b180a2e915bb4372f8d84fb7b707db944a5fd
-
SSDEEP
384:fJ1mIUcCgKY2mPNIrJwIhn7ytQtJUMTNOt894boE9K/mKHboI3:Xm55gKGPNSHftJDhEvKHbo6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\spoolsv.exe" 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\spoolsv.exe" spoolsv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe File created C:\Windows\spoolsv.exe spoolsv.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\www.google.com 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\www.google.com spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe Token: SeDebugPrivilege 1240 spoolsv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1240 2944 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe 28 PID 2944 wrote to memory of 1240 2944 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe 28 PID 2944 wrote to memory of 1240 2944 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe 28 PID 2944 wrote to memory of 1240 2944 3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe"C:\Users\Admin\AppData\Local\Temp\3b1d2a8456dfefabf62680e9bebf780608fab73c29b7fbd47643630e75e136a3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\spoolsv.exe"C:\Windows\spoolsv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5b039bcb420ee88b762f2b7f8c00c5aa3
SHA141ebd2be61251c7f6685fd530a384a4c6830d656
SHA25667858a6e07897ce72e12a999c10397bf2beabdce66fc8ad61a837a9e5590363f
SHA51205ec42cf2ac091154cb09a3de26f44fac624034eaa2c56eb1602d1790e1624562f4f0d11fab37d3733c9177acb1be4ccd9b9cd16327eef06b6c268a441f012c9
-
Filesize
25KB
MD5b039bcb420ee88b762f2b7f8c00c5aa3
SHA141ebd2be61251c7f6685fd530a384a4c6830d656
SHA25667858a6e07897ce72e12a999c10397bf2beabdce66fc8ad61a837a9e5590363f
SHA51205ec42cf2ac091154cb09a3de26f44fac624034eaa2c56eb1602d1790e1624562f4f0d11fab37d3733c9177acb1be4ccd9b9cd16327eef06b6c268a441f012c9
-
Filesize
25KB
MD59ba0942ba2b766b43b832ad20b186324
SHA14352dd8ee4fcf525400ba6d8cd31ef296f421790
SHA256b788302ea044a0843019e224643d5af1935d420ba716e783b28750b9301c0f4c
SHA5129d485424f423342f6135da72a2e396f6215320cf7849deb3d6a24da0d72b1d3d937a3d6a38023607d8bb760948b5e37c5ff4c743e4246d25c259e5f0ecef6b0b
-
Filesize
25KB
MD59ba0942ba2b766b43b832ad20b186324
SHA14352dd8ee4fcf525400ba6d8cd31ef296f421790
SHA256b788302ea044a0843019e224643d5af1935d420ba716e783b28750b9301c0f4c
SHA5129d485424f423342f6135da72a2e396f6215320cf7849deb3d6a24da0d72b1d3d937a3d6a38023607d8bb760948b5e37c5ff4c743e4246d25c259e5f0ecef6b0b