Analysis

  • max time kernel
    161s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 16:48

General

  • Target

    c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe

  • Size

    25KB

  • MD5

    ae93790db7d6eccc2abf4676a21cb814

  • SHA1

    32f2eb1c8d8231e143a03ac99ef8de2a328d293a

  • SHA256

    c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf

  • SHA512

    b07db376d83b7fbfe425b83e19fc524ea1bb5b830e2fa3733a6db0791edf3beeb86268bcd47b8e0298b31d990584a86352166a32015b813965d16f4087d63d8c

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvSY:8Q3LotOPNSQVwVVxGKEvKHrVSY

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe
    "C:\Users\Admin\AppData\Local\Temp\c82bce0f8002ede8cbbb5ad544df055d3f53bad75b42cc69ff86f8922a259fdf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    347KB

    MD5

    dacb488f0499596bc839957254babcdd

    SHA1

    74d1edc84d71f51fa36f8b65cfd1f3ffdbf9a486

    SHA256

    925226a50183d81535ba192f922b2a884e301f2094cfbb5fd3b307854e2d6ee3

    SHA512

    781d9a29d0e137cb5d6fb56c17a2298c2e75bf526eb91e8c070bdd4daf7f573c150768634975f3505f28a4838c95f9ab1d25fa6b3e87419c25743196def81e92

  • C:\Users\Admin\AppData\Local\Temp\P5QYWjUc6HET8L6.exe

    Filesize

    25KB

    MD5

    6d9f69953df167fb29bb906661575768

    SHA1

    07d4a3bd2d01f1daf89b9a4f71e66a65aed494a9

    SHA256

    5c4b094efaa325fe6fec054afd825840d5655fbc566770120502ab1698698651

    SHA512

    f29f2feb11368316bc86d05bdfb4f6f39f1ef82c5c477dd7000783c467502b66d2660175136bfbad24b1bdc2ff0c51d8ab28ac836ad6c67e0d86540540ac7833

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb