Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:56

General

  • Target

    2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe

  • Size

    25KB

  • MD5

    2ca55b2dfe1e5515e8ae20288e11b8b5

  • SHA1

    e3a22fab668ae0accb2f3ba330771cd4b59ba8b8

  • SHA256

    2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5

  • SHA512

    9d617d3f6db74a66c34eda75f19725746fbd2cbf155be7a87404ce955006869e0f2f0c6d92d57ad8a332672c18276b5999bd2fc4810b6123e9154d4b52851abb

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvu:8Q3LotOPNSQVwVVxGKEvKHrVu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gngwQzcOuY9RF35.exe

    Filesize

    25KB

    MD5

    4233a5b54c935bd6fc2a31c9ab2399e0

    SHA1

    054649a7bfac5bd646377a32f2a7b8ffc446a818

    SHA256

    d2efb8a9830fa53c276c31fd72c884d7176ae496c14dd92330b54d18d9368c1a

    SHA512

    be7934b77f412f3873bbcc5634ada19ca7b00c412a50a7888cf72eeba5b0be4ef46e96e884ba1fd12b59b841073cee1cb10ec136cc5a840960bb2993e28a935a

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\x86_microsoft-windows-ldifde.resources_31bf3856ad364e35_6.1.7601.17514_it-it_709195e5a0ee5275\ldifde.exe.mui

    Filesize

    50KB

    MD5

    cb0487d5c2b6a47fdcb1664ee5cf1e05

    SHA1

    ccd1c469e431a58a8cd26bbe537f423e8c762415

    SHA256

    d37af1592f7d6138f3b45150059840886c7ec25d1ba105cd866abc9d514e7b74

    SHA512

    d052738edf5152ee28101f0650be638bf5493fe0e89e105a0e90486ad1de87acd2b9f6795c3671f3562f73edec078a9cce3613591a99f4b7f13858bbd6b498ff

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb