Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:27
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230831-en
General
-
Target
svchost.exe
-
Size
2.2MB
-
MD5
f03dfb589547f36347100634d84b13eb
-
SHA1
962791267c7ef9d478d67bddceab8a8132f0e44a
-
SHA256
3bed0b372700d3421c5833e16585b22f7396d5552fd2ce166ade3f4c4236492b
-
SHA512
fc47e9fd101e54b65ce1211efa3e48d08f2453fd5a506ab1f3587d2b4da802e243d8855f486eedf71ff3ca719da63244fe94a4896fd6002d5a587fec479cd1c1
-
SSDEEP
24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtM:PBozBdhEV7q8bOQnIFWY+3Je0w0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_W0_wE0_aE0_pE0_NL_{2db671ee-53d1-11ee-9349-806e6f6e6963}_cwRID5NrNZ.zip
Filesize1.2MB
MD52760192bbe668b4b834a4a74c1967937
SHA19ddf9209f67ee5fedaa9bd84403d7cfe0378b0e5
SHA2565f399639656bf2630a3914a5f5416271e112209693d9fa6230baa6f3bdb8d1a2
SHA51286ce65b7ccf6a273fe51e586fe9a7b3d434ab28c0ccffae138913e940fe800969c2f4e3f9e78c8632cdd2ecf6b264c77215c6a439019344e83b6ca729d24e43b