Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe
Resource
win10v2004-20230915-en
General
-
Target
80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe
-
Size
25KB
-
MD5
95ad164331fad71139b90fed620a6ea2
-
SHA1
8e75659eb1827d048cb5b9738934ce77bf78d1aa
-
SHA256
80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718
-
SHA512
c93eec795b3fa462b7efe3d4873df99c9fcc0345f400ce6cf59dbe7b5feedc3ee3de6e7d4f4de874921eb849e651aad9e577710d97f2e45e05a75ba122cf226c
-
SSDEEP
384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjv4tv:8Q3LotOPNSQVwVVxGKEvKHrVGv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" spoolsv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe File created C:\Windows\spoolsv.exe spoolsv.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\onsapay.com\loader spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1988 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe Token: SeDebugPrivilege 1316 spoolsv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1316 1988 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe 88 PID 1988 wrote to memory of 1316 1988 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe 88 PID 1988 wrote to memory of 1316 1988 80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe"C:\Users\Admin\AppData\Local\Temp\80a58359cb934ce12d2ed3c5131b2e6f72818d4ca453b8e30670761301faf718.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\spoolsv.exe"C:\Windows\spoolsv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5e2ee7ed4de9d769939349f8e5de97568
SHA1932223000edc17c50ba41da3baf18aa38670f0ba
SHA2569f51c24a1bc8ff9d0d66796db2d3672b5cffbc418265ca99fcbf07821e02eccb
SHA512c3641b0fa22514d6c37df972d1d58c36b234cbb28c4f8e3e7a3d136d6e986dfebf29614756bdb3993c86f450ea39dfa25e181a8032903a7451833dee6c952b29
-
Filesize
25KB
MD5f23ee787e0ea2f771a14ccbb836bf8d3
SHA199b8c0f1a47168f56fb9a664469d677a5e5002ea
SHA2569a0f6e28337259c38a9f212b04fe2b76ecc4027276bd4d1fe06b650f27ece593
SHA512f714d2fc040c8a65ba47e9f3daa71a9aba1ff94576afcefd05aa848e544ec17ac610be1f30c4edfeb053d2a57cc6351c482b01b206688aa7aa403863b4bf9e7c
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb