Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe
Resource
win10v2004-20230915-en
General
-
Target
c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe
-
Size
25KB
-
MD5
ae93790db7d6eccc2abf4676a21cb814
-
SHA1
32f2eb1c8d8231e143a03ac99ef8de2a328d293a
-
SHA256
c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf
-
SHA512
b07db376d83b7fbfe425b83e19fc524ea1bb5b830e2fa3733a6db0791edf3beeb86268bcd47b8e0298b31d990584a86352166a32015b813965d16f4087d63d8c
-
SSDEEP
384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvSY:8Q3LotOPNSQVwVVxGKEvKHrVSY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 spoolsv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "C:\\Windows\\spoolsv.exe" spoolsv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe File created C:\Windows\spoolsv.exe spoolsv.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\onsapay.com\loader spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1304 c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe Token: SeDebugPrivilege 936 spoolsv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 936 1304 c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe 82 PID 1304 wrote to memory of 936 1304 c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe 82 PID 1304 wrote to memory of 936 1304 c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe"C:\Users\Admin\AppData\Local\Temp\c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\spoolsv.exe"C:\Windows\spoolsv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dacb488f0499596bc839957254babcdd
SHA174d1edc84d71f51fa36f8b65cfd1f3ffdbf9a486
SHA256925226a50183d81535ba192f922b2a884e301f2094cfbb5fd3b307854e2d6ee3
SHA512781d9a29d0e137cb5d6fb56c17a2298c2e75bf526eb91e8c070bdd4daf7f573c150768634975f3505f28a4838c95f9ab1d25fa6b3e87419c25743196def81e92
-
Filesize
25KB
MD56d9f69953df167fb29bb906661575768
SHA107d4a3bd2d01f1daf89b9a4f71e66a65aed494a9
SHA2565c4b094efaa325fe6fec054afd825840d5655fbc566770120502ab1698698651
SHA512f29f2feb11368316bc86d05bdfb4f6f39f1ef82c5c477dd7000783c467502b66d2660175136bfbad24b1bdc2ff0c51d8ab28ac836ad6c67e0d86540540ac7833
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb
-
Filesize
25KB
MD582071fd2379c64429acf376487fcddff
SHA12da42c7eaa62ecee65757b441c939f12b52228fb
SHA256272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8
SHA512194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb