Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe
Resource
win7-20231023-en
General
-
Target
b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe
-
Size
2.3MB
-
MD5
d56df2995b539368495f3300e48d8e18
-
SHA1
8d2d02923afb5fb5e09ce1592104db17a3128246
-
SHA256
b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6
-
SHA512
2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008
-
SSDEEP
49152:5u2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsC:5+zX71oDCRAZUviAHImDqia7hsC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 Broom.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z0MOBW01\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Broom.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3618187007-3650799920-3290345941-1000\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1HY7WIQC\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8GIGFD9B\desktop.ini Broom.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3618187007-3650799920-3290345941-1000\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ESV7R4E\desktop.ini Broom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Broom.exe -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification C:\Windows\Prefetch\AgAppLaunch.db Broom.exe File opened for modification C:\Windows\Prefetch\AgRobust.db Broom.exe File opened for modification C:\Windows\Prefetch\CMD.EXE-4A81B364.pf Broom.exe File opened for modification C:\Windows\Prefetch\NTOSBOOT-B00DFAAD.pf Broom.exe File opened for modification C:\Windows\Prefetch\REG.EXE-E7E8BD26.pf Broom.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-2CD59FDD.pf Broom.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-863AA78D.pf Broom.exe File opened for modification C:\Windows\Prefetch\SPPSVC.EXE-B0F8131B.pf Broom.exe File opened for modification C:\Windows\Prefetch\BFSVC.EXE-9C7A4DEE.pf Broom.exe File opened for modification C:\Windows\Prefetch\CLRGC.EXE-5D5B90F5.pf Broom.exe File opened for modification C:\Windows\Prefetch\ReadyBoot\ReadyBoot.etl Broom.exe File opened for modification C:\Windows\Prefetch\AgGlFaultHistory.db Broom.exe File opened for modification C:\Windows\Prefetch\AgGlFgAppHistory.db Broom.exe File opened for modification C:\Windows\Prefetch\AgGlGlobalHistory.db Broom.exe File opened for modification C:\Windows\Prefetch\DRVINST.EXE-4CB4314A.pf Broom.exe File opened for modification C:\Windows\Prefetch\MSCORSVW.EXE-245ED79E.pf Broom.exe File opened for modification C:\Windows\Prefetch\PfSvPerfStats.bin Broom.exe File opened for modification C:\Windows\Prefetch\CONHOST.EXE-1F3E9D7E.pf Broom.exe File opened for modification C:\Windows\Prefetch\MSCORSVW.EXE-90526FAC.pf Broom.exe File opened for modification C:\Windows\Prefetch\NETSH.EXE-F1B6DA12.pf Broom.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-860C49A4.pf Broom.exe File opened for modification C:\Windows\Prefetch\SETUPUGC.EXE-E3C49C28.pf Broom.exe File opened for modification C:\Windows\Prefetch\TASKHOST.EXE-7238F31D.pf Broom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2756 Broom.exe Token: SeDebugPrivilege 2756 Broom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 Broom.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2756 2924 b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe 28 PID 2924 wrote to memory of 2756 2924 b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe 28 PID 2924 wrote to memory of 2756 2924 b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe 28 PID 2924 wrote to memory of 2756 2924 b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe 28 PID 2756 wrote to memory of 2652 2756 Broom.exe 29 PID 2756 wrote to memory of 2652 2756 Broom.exe 29 PID 2756 wrote to memory of 2652 2756 Broom.exe 29 PID 2756 wrote to memory of 2652 2756 Broom.exe 29 PID 2756 wrote to memory of 2936 2756 Broom.exe 31 PID 2756 wrote to memory of 2936 2756 Broom.exe 31 PID 2756 wrote to memory of 2936 2756 Broom.exe 31 PID 2756 wrote to memory of 2936 2756 Broom.exe 31 PID 2756 wrote to memory of 2544 2756 Broom.exe 33 PID 2756 wrote to memory of 2544 2756 Broom.exe 33 PID 2756 wrote to memory of 2544 2756 Broom.exe 33 PID 2756 wrote to memory of 2544 2756 Broom.exe 33 PID 2756 wrote to memory of 2500 2756 Broom.exe 35 PID 2756 wrote to memory of 2500 2756 Broom.exe 35 PID 2756 wrote to memory of 2500 2756 Broom.exe 35 PID 2756 wrote to memory of 2500 2756 Broom.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe"C:\Users\Admin\AppData\Local\Temp\b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c rd /s /q c:\$Recycle.bin3⤵PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd /c rd /s /q c:\recycler3⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c rd /s /q c:\$Recycle.bin3⤵PID:2544
-
-
C:\Windows\SysWOW64\cmd.execmd /c rd /s /q c:\recycler3⤵PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca