Analysis
-
max time kernel
2s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
15423983f3d88a420046dcee942b02df.exe
Resource
win7-20231215-en
General
-
Target
15423983f3d88a420046dcee942b02df.exe
-
Size
822KB
-
MD5
15423983f3d88a420046dcee942b02df
-
SHA1
9ba79809d9801a3ec22e4a43c8edcaefdbff7111
-
SHA256
e2e71408bbf2e68cceafcf2ec9ac72a3785193ebe6b4d82dc974c701afd13f72
-
SHA512
940fdf43bce67349874f3a48957e70d0690f0040e809a0d9aa568a5789e62dae03e46197908f20872ee46cfb8c1d3d3c6f4da2fd03f88d4c5b3c35d63de691a1
-
SSDEEP
24576:nOUjsjkycf3Eo63cbJd5A8uvKtSAvKQOAkhKnHPdt/:1js23Eo5bSDvKtSAvKQ5khKnvdt/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4952 dllstub.exe -
Loads dropped DLL 39 IoCs
pid Process 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe 640 15423983f3d88a420046dcee942b02df.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4064 640 WerFault.exe 14 -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023248-167.dat nsis_installer_2 behavioral2/files/0x0009000000023248-166.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 4952 640 15423983f3d88a420046dcee942b02df.exe 67 PID 640 wrote to memory of 4952 640 15423983f3d88a420046dcee942b02df.exe 67 PID 640 wrote to memory of 4952 640 15423983f3d88a420046dcee942b02df.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\15423983f3d88a420046dcee942b02df.exe"C:\Users\Admin\AppData\Local\Temp\15423983f3d88a420046dcee942b02df.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 11162⤵
- Program crash
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\nsl48C2.tmp\dllstub.exeC:\Users\Admin\AppData\Local\Temp\nsl48C2.tmp\dllstub.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~3515~3729~~URL Parts Error~~SendRequest Error~6A-4E-67-23-AB-77~#~~SendRequest Error~~~~2⤵
- Executes dropped EXE
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 640 -ip 6401⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ad41d2238c7c9c2c0deb3d4a03ba18fd
SHA1ec3c3dc197d8fc2e73afee1a07b52518b31109ad
SHA2561e8f08bb409b72ec8a0f0f954821d1aa61eb0e603de1cbe4885a40d8a13a768c
SHA512bfb298bbbd9d9a1540c61da6560d0b9d8cdaca800054908f41296e1e9ee947f7c498bf61e6cdf7725f0e5ab687569509d7fbc2bc9ac256993a021e9d513ab652
-
Filesize
6KB
MD55264f7d6d89d1dc04955cfb391798446
SHA1211d8d3e7c2b2f57f54a11cb8bc4fa536df08acc
SHA2567d76c7dd8f7cd5a87e0118dacb434db3971a049501e22a5f4b947154621ab3d4
SHA51280d27ee2f87e2822bd5c8c55cc3d1e49beebb86d8557c92b52b7cbea9f27882d80e59eefa25e414eecee268a9a6193b6b50b748de33c778b007cde24ef8bcfb7
-
Filesize
66KB
MD5b140459077c7c39be4bef249c2f84535
SHA1c56498241c2ddafb01961596da16d08d1b11cd35
SHA2560598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67
SHA512fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328
-
Filesize
65KB
MD5d5649b5fcbb827635ca5a89e3e1cf6ee
SHA1c86143c5708bf178f6928fb9a7b22c0f92159611
SHA2566806d53b46830305ad632ed268bf7e8905498a17c810b6bfc2b0ff8292f12786
SHA512c8ab701a3cf0e1a86cecdfee231b71bde7fa0784129a6d7f65f20649239b0c740daa2bae859132560477400d62f1c5a9f94fbd7d933f28e738355d2937af5602
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
36KB
MD5cf0d5a8b41d9dad66a6b58a215c40fae
SHA1efcdbe2988d69e28c2430edb1574d29a65da0401
SHA256b2e05e1baeba1c2e02a392b7ce65c0a31b588f83a7293e432881d30305ff7f4d
SHA5127f416de67f771c866be19a090b2da85f77735f8e346ae01e9b5510e61080582846856dc45b17f5d2b5ea06e624116f6bc028b8f622ff78279cf398e72fafa9e1
-
Filesize
66KB
MD55ba9cd85f2dc3e0e6b132c06741b194a
SHA19c323b7a5644a153dcb09dc8d6e69d99befdd2eb
SHA256227562eaaadce843a398b1554547d62984a525ed4f877273a2af68df509651ac
SHA51277851e63e7541af36018145ba7fca2c97ff357226c1677879dd43de34f8847bec6d8950512f3a74261638a832349270766a955bd2d59f6082ce59d001267deff
-
Filesize
10KB
MD5d719b940a55217d0a90f10866265c5ab
SHA128b432beb7a6475d4b329d44532231082087cc90
SHA2567cba3a059e4b134246ca153992d0b3e032fda1ce61c1204cf9dd654e8453540e
SHA512d3a5e67acba959cf28dd13b4d4cba97fba3db3b2249b62d0a66fc93188f420836f52074014b31841e0a185afb7f0d56314d0be132d38dbd235bc7992db8a0846
-
Filesize
23KB
MD5f2b46b3a9e3f90b2b4e9be92b2bbce0e
SHA14b0f4d299d7ba0bb20e737f2fb3ea00cf4737537
SHA256d5d7488467692efed00a8c7b90eb7b9ab800deba1584a2e6b9d68e188278926e
SHA5125c95397bb8de4490dd3e37221c98cc276646c9c98ad86fb354529e71f40649e654ea9d671e259217a821a4cf364a6bed82e2e315d299e0dcca3ea32216d93520
-
Filesize
5KB
MD5832839f77184951076f005d77fd253b6
SHA1c4fcec57083673a4488ac1e10387818b9d5d0bdd
SHA25673147c92305bca1b1741315215c81e506609de10c43011902b4113df31bf9949
SHA5124a48a4ef0fa0872f3d558eda157b401136426d711978724e93f807b8cb30ffbc67b7f914552f7956f39be4c4775b44d315327f054c5269007b7e7acb06f5de40
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
7KB
MD52d84e827f14bc55d672a8d5b1f6b249c
SHA1078be20cfd31ee5dfe78ae629aef5a3a8f103fd2
SHA256a0d81ac86eb0c5fb8a5309a7eae5fafe387f38aeab679c1bf29533e602348818
SHA512e32f3407e15bee5c91b7102a48c8310f94d22a6737368259849ac3528a2410a8a9c9811d0117c6a4f88c3fc1b8c4723bbe250886e5121e52d2e734e1120e5043
-
Filesize
5KB
MD5a428a1a97d287da6edf2291c2f90ff17
SHA12ba8be5f51a28b623f349b0285cc207e521e023c
SHA256648548dac5e1e47a573b0505c0fae83d172eb0cb24854aaf048a3b82f0723d81
SHA51220d6e0138472d5166460a2d54ac0f8cb33489d84c8a857e4ede0c79853157b4895e871972d14a3b3cb1b0483aec14d19ebb1f548f861b9b2a0861db4dfae9af7
-
Filesize
16KB
MD524a7a119e289f1b5b69f3d6cf258db7c
SHA1fec84298f9819adf155fcf4e9e57dd402636c177
SHA256ae53f8e00574a87dd243fdf344141417cfe2af318c6c5e363a030d727a6c75d1
SHA512fdbbedcc877bf020a5965f6ba8586ade48cfbe03ac0af8190a8acf077fb294ffd6b5a7ae49870bff8cacd9e33d591be63b5b3d5c2e432c640212bdcd0c602861
-
Filesize
14KB
MD5d44e9cd3534f80cb544ed390def5c29a
SHA11d73e175a6e925fcc8ca7b68f884836c9f03d12d
SHA256005326a16efba514b392591936635cd42c2738437d6e4bc1894260b7f65b28a5
SHA512f7c1a40f7c35f4282d489695d5ede2cadcbbe63d1ac8ab2041781170c5c86b0382d29825a58180ed00ba8300248e8356c9efbd7b46247c6e67cc9c5b8c2639b2
-
Filesize
15KB
MD5d4a43c1645ad2870b01d7317aea4c096
SHA19897f9b75f3bcaafc6770c76e07739042d6819cd
SHA256c2301393eb06741f0e3a8ff1d6079a7454e8578ede80ef3a44b6f7be9b90a20f
SHA51262149dd9a598ee165d346482cef50246513e8f4aa568095f90af26a77b58914b46f6c89bfb2b22d6df82c6cb5104d21ccefc14ffc7b2ad7f0fee1805351c9437