Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2023, 18:36

General

  • Target

    ab0093c8475fa411dd86016b2ba3573e647d53a021a6b850a95de56395a119be.exe

  • Size

    25KB

  • MD5

    79d894525f1324f85c98e68b2fd3f474

  • SHA1

    5529ee0a058c054ac3ccc0e8126cf94c6f811681

  • SHA256

    ab0093c8475fa411dd86016b2ba3573e647d53a021a6b850a95de56395a119be

  • SHA512

    93ae3b133cddb77f567b1bafa1bbdd08d7109d7cb560804fbb6ac35df2c43976e368dfa210b61cdc7b039947c79ccc593861d517d89a7abe4909cd6bac4f889c

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvFlK/:8Q3LotOPNSQVwVVxGKEvKHrVFg

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0093c8475fa411dd86016b2ba3573e647d53a021a6b850a95de56395a119be.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0093c8475fa411dd86016b2ba3573e647d53a021a6b850a95de56395a119be.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:1916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          348KB

          MD5

          442780a4f05aea5250f3ecce44656fb6

          SHA1

          b92b7fb66dd891141cfcacd37d87bc3ab1c97289

          SHA256

          8ffd2d06b3c2c69450391a02465b968a12bf727ec64bfbf56c17d723f05f1892

          SHA512

          58394dd7df6b24c6c327ccc6c15f285ecd71d94ad575100e97e483d5414b139a106286cebd4a086cbd1597df0c587d7695ebcc8ac52a1c00a93d9b69d011a1bd

        • C:\Users\Admin\AppData\Local\Temp\mqxMAwKic5ppF6m.exe

          Filesize

          25KB

          MD5

          7e001c3e535b4c5adaf97dddfecdf779

          SHA1

          f458f04569b5b2ffefb0dea7014bb3c6dc98f908

          SHA256

          f7fde7283fcee6054c34a6477e1539db7150485b599e184dd32343b9863c1f78

          SHA512

          79c55e0ec240c18fece76dbe3a22e6eed15c5938169aefdadfaf96c038e832489ccfa263f9ed8466d8b911baa3da859b19660324156fc345259fbacef724f9d5

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

        • C:\Windows\spoolsv.exe

          Filesize

          25KB

          MD5

          82071fd2379c64429acf376487fcddff

          SHA1

          2da42c7eaa62ecee65757b441c939f12b52228fb

          SHA256

          272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

          SHA512

          194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb