Analysis

  • max time kernel
    153s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 07:18

General

  • Target

    e0380878a3db5ab4f7d65e52a01ce099424194304babbdd0ede40ffd274b570c.exe

  • Size

    25KB

  • MD5

    2e409a984fa3f4172c7393e4abd6853d

  • SHA1

    8ef21be10322e4a76211a7be0187d9273fb037e6

  • SHA256

    e0380878a3db5ab4f7d65e52a01ce099424194304babbdd0ede40ffd274b570c

  • SHA512

    ef8b8742dbb8557e519a8dde54d6011d5b61c889d4582e839f8b111775c77d5ac0023d6fd1938f0de4812335c3499b3ddd6340dfc0ce1d7335b2cf3fe2182f24

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvT:8Q3LotOPNSQVwVVxGKEvKHrVT

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0380878a3db5ab4f7d65e52a01ce099424194304babbdd0ede40ffd274b570c.exe
    "C:\Users\Admin\AppData\Local\Temp\e0380878a3db5ab4f7d65e52a01ce099424194304babbdd0ede40ffd274b570c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\auol0NcfVpKu3pR.exe

    Filesize

    25KB

    MD5

    e9cc5c0b9d67fb95465c7ba676e6784b

    SHA1

    a63bac4d729f787b513b92985c330013591dadb4

    SHA256

    7d535a9d268d5fdf11857ebeb13fa22c96be372af1d986f7f57c9510d2b7921a

    SHA512

    2e47b6ba03a86de8c9f57cd50dcd2aa00cc9786dc9b6e9066396691ffe1fad68a0c91950627f059dfa32850664eb6d16aef008eda96d72285c2593d3e93d7cda

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\x86_microsoft-windows-ldifde.resources_31bf3856ad364e35_6.1.7601.17514_it-it_709195e5a0ee5275\ldifde.exe.mui

    Filesize

    50KB

    MD5

    e3b7efed20e639d8410c78dcbe99fc39

    SHA1

    4adb8289d4991432e93e9fb447b7124b11742ee8

    SHA256

    b79c752f19b47c7161e4bdb2d307584818976e5de57f2b5d6011bfea315c28de

    SHA512

    9bfdb5242956f6495510d03593244419c565bd1e6783f70f779279144249936cb90ab33d1b987d2baebf0cfba5652cd57cee3f408581e7672dc024ead371b0c6

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb