Analysis
-
max time kernel
116s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 13:08
Behavioral task
behavioral1
Sample
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe
Resource
win7-20231025-en
General
-
Target
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe
-
Size
1.1MB
-
MD5
46538d346292f9a646b76630e550033d
-
SHA1
29b502ee7a8dd515540f39f83045c19517402e1f
-
SHA256
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71
-
SHA512
c40ba2d92ef757c1f3e474022401ef5617fd8ca2c4ec9c954069cfcff3b99d2ba84c4f913872e67a95cf454d05d5a4735e75a7294021f170826e8049a1ad63f3
-
SSDEEP
24576:f88FPfkO54pZylJ1qguavXeLi4SkAJxiHH1/cgX2HOEwhjHX57WlAVq7aAu4DQKD:f7UO54pZylJ1qguaWL+yHBc7vwZNW6Vi
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2950800.txt cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4808 77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 408 4808 77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe 87 PID 4808 wrote to memory of 408 4808 77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe 87 PID 4808 wrote to memory of 408 4808 77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe"C:\Users\Admin\AppData\Local\Temp\77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\cress.bat2⤵
- Drops file in Windows directory
PID:408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bc14eedce16f2848028f6b2fbdfb4e10
SHA148b5ac186eaf243c2331e383e3f0d5dc2c3a03a7
SHA256af4eeeb743372f47276659a332ca7853231aab575701c5a3a47509e9d5b6a39a
SHA512cdcd3d42e3f77f603ec42efb015b1b4ce4e6dacabcf06b713b1ac008652fd9c7897e13cd1f43addb2891996cbd3944346ad4bacdd28ab985a8fafd2c1d06f292