Analysis

  • max time kernel
    118s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 22:09

General

  • Target

    83379a60d92decf1e000a63d75326a0f682986cf8d6d8ff6b4a673667d900897.exe

  • Size

    25KB

  • MD5

    5a119f7ea1cd570cb227e27f4f27f73c

  • SHA1

    07c5cca9b40e70361e991a8fe3c4f4bcc9bd805d

  • SHA256

    83379a60d92decf1e000a63d75326a0f682986cf8d6d8ff6b4a673667d900897

  • SHA512

    c7397eacca5bbd5243e34c6389e27190a25c7014b1e6140c54530640f9431ad53cdc5a7c0cace21dd8755a654b9980da51472159b61b873933b68a2d33caf9e8

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvdk6:8Q3LotOPNSQVwVVxGKEvKHrVdk6

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83379a60d92decf1e000a63d75326a0f682986cf8d6d8ff6b4a673667d900897.exe
    "C:\Users\Admin\AppData\Local\Temp\83379a60d92decf1e000a63d75326a0f682986cf8d6d8ff6b4a673667d900897.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\H1CV2C8aqgmT2IP.exe

    Filesize

    25KB

    MD5

    eb7003eed0c7cfe4470b12417767c0b8

    SHA1

    59fe3a941e2cfdbe38838e0eb2064421605797e6

    SHA256

    18ea061deacd7ff7f6602c319b8f9b1a890015a5d92e4680ba9cdb33cd2d29f3

    SHA512

    8cc05d73e2b2014151193043f0677935dd09028e1c7ac7e394972d77bfd3b73b8947468dab43a38b02d6460844f8c40368cc979f52413b37bf546ff2fa2ea0b3

  • C:\Users\Admin\AppData\Local\Temp\H1CV2C8aqgmT2IP.exe

    Filesize

    25KB

    MD5

    eb7003eed0c7cfe4470b12417767c0b8

    SHA1

    59fe3a941e2cfdbe38838e0eb2064421605797e6

    SHA256

    18ea061deacd7ff7f6602c319b8f9b1a890015a5d92e4680ba9cdb33cd2d29f3

    SHA512

    8cc05d73e2b2014151193043f0677935dd09028e1c7ac7e394972d77bfd3b73b8947468dab43a38b02d6460844f8c40368cc979f52413b37bf546ff2fa2ea0b3

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb