Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe
Resource
win10v2004-20230915-en
General
-
Target
d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe
-
Size
5.6MB
-
MD5
1f14f2a77f388d6a6ffdd8f2dd556c38
-
SHA1
fed109591f58620ba86fc800971514ed8b95d4df
-
SHA256
d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1
-
SHA512
fa1668f1d3d0c25d095886c36ba7492efd8c09c69934b4ae8bf674a0bc4ae241d73f3ce5b0a219c2b2a3c288c720d4a6de68c931b76f1457ab5151f07c868c57
-
SSDEEP
49152:u2p+ZZx7qkrH0TZSqmtic94m46ORSmtic9:+Lx7qkrHi5mthum46ORSmth
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\1.exe" d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 1.exe File opened (read-only) \??\S: 1.exe File opened (read-only) \??\U: 1.exe File opened (read-only) \??\X: 1.exe File opened (read-only) \??\Z: 1.exe File opened (read-only) \??\Y: 1.exe File opened (read-only) \??\I: 1.exe File opened (read-only) \??\J: 1.exe File opened (read-only) \??\M: 1.exe File opened (read-only) \??\N: 1.exe File opened (read-only) \??\O: 1.exe File opened (read-only) \??\P: 1.exe File opened (read-only) \??\V: 1.exe File opened (read-only) \??\A: 1.exe File opened (read-only) \??\B: 1.exe File opened (read-only) \??\G: 1.exe File opened (read-only) \??\L: 1.exe File opened (read-only) \??\Q: 1.exe File opened (read-only) \??\T: 1.exe File opened (read-only) \??\W: 1.exe File opened (read-only) \??\E: 1.exe File opened (read-only) \??\K: 1.exe File opened (read-only) \??\R: 1.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 2684 1.exe 2684 1.exe 2684 1.exe 2684 1.exe 2684 1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 2684 1.exe 2684 1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2684 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 28 PID 2880 wrote to memory of 2684 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 28 PID 2880 wrote to memory of 2684 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 28 PID 2880 wrote to memory of 2684 2880 d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe"C:\Users\Admin\AppData\Local\Temp\d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\1.exeC:\1.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD51f14f2a77f388d6a6ffdd8f2dd556c38
SHA1fed109591f58620ba86fc800971514ed8b95d4df
SHA256d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1
SHA512fa1668f1d3d0c25d095886c36ba7492efd8c09c69934b4ae8bf674a0bc4ae241d73f3ce5b0a219c2b2a3c288c720d4a6de68c931b76f1457ab5151f07c868c57
-
Filesize
5.6MB
MD51f14f2a77f388d6a6ffdd8f2dd556c38
SHA1fed109591f58620ba86fc800971514ed8b95d4df
SHA256d97919753feb37b7c116f9a9dd8d77841701f440f96fdfa3d6b5a06ec48fc9b1
SHA512fa1668f1d3d0c25d095886c36ba7492efd8c09c69934b4ae8bf674a0bc4ae241d73f3ce5b0a219c2b2a3c288c720d4a6de68c931b76f1457ab5151f07c868c57
-
Filesize
79B
MD5d830992ba5f8e239f52bccf0ca589fce
SHA1e31f83743fc42c6ed46a4e944a91c0adc51199db
SHA25603bae907d8cd1ebcb08372b9b5d85b56c2f5580a93a295dccdc5f3d62a0573c5
SHA5122d9e226be931d636d8f26e83117bba27ad0b19a16699a43c1d659ca2be20f1419bc89835171344291cf2ec6b3feb408ca1e1df38275f04dc9945199c285b5a93