Analysis

  • max time kernel
    116s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2023 13:08

General

  • Target

    77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe

  • Size

    1.1MB

  • MD5

    46538d346292f9a646b76630e550033d

  • SHA1

    29b502ee7a8dd515540f39f83045c19517402e1f

  • SHA256

    77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71

  • SHA512

    c40ba2d92ef757c1f3e474022401ef5617fd8ca2c4ec9c954069cfcff3b99d2ba84c4f913872e67a95cf454d05d5a4735e75a7294021f170826e8049a1ad63f3

  • SSDEEP

    24576:f88FPfkO54pZylJ1qguavXeLi4SkAJxiHH1/cgX2HOEwhjHX57WlAVq7aAu4DQKD:f7UO54pZylJ1qguaWL+yHBc7vwZNW6Vi

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe
    "C:\Users\Admin\AppData\Local\Temp\77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\cress.bat
      2⤵
      • Drops file in Windows directory
      PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\cress.bat

    Filesize

    2KB

    MD5

    bc14eedce16f2848028f6b2fbdfb4e10

    SHA1

    48b5ac186eaf243c2331e383e3f0d5dc2c3a03a7

    SHA256

    af4eeeb743372f47276659a332ca7853231aab575701c5a3a47509e9d5b6a39a

    SHA512

    cdcd3d42e3f77f603ec42efb015b1b4ce4e6dacabcf06b713b1ac008652fd9c7897e13cd1f43addb2891996cbd3944346ad4bacdd28ab985a8fafd2c1d06f292

  • memory/4808-0-0x00FFFFFF00FFFFFF-0x00FFFFFF00FFFFFF-memory.dmp