Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
1433214838524ccdac23a9139c169cdd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1433214838524ccdac23a9139c169cdd.exe
Resource
win10v2004-20231215-en
General
-
Target
1433214838524ccdac23a9139c169cdd.exe
-
Size
156KB
-
MD5
1433214838524ccdac23a9139c169cdd
-
SHA1
7831f5c8e05d233f29456a48d8690c7e49f77f23
-
SHA256
e8d7eb1532d41c0b920a8c3d01bff63f23619c4e04a80de22ba27f7b18437fb8
-
SHA512
2ccc394896f398e5ff111591428ec1ec74352094e3933895deeacb651c1960a71b8ffbcac2ec072bb3a5887b4a4328ecdac63f0e6f69b71cc4a26cdffa3f5284
-
SSDEEP
3072:GLXTYjj9L4obnXm/j/Dq03eYeUB1GQE3pxBnAsudd639SvO3t5:WX8aaXm/7Dq2pBjE3pzwdsaOH
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1896-1-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-7-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-8-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1896-20-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2432-82-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1896-84-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2676-144-0x0000000000500000-0x0000000000600000-memory.dmp upx behavioral1/memory/1896-187-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1896-190-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1896-196-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 1433214838524ccdac23a9139c169cdd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2676 1896 1433214838524ccdac23a9139c169cdd.exe 28 PID 1896 wrote to memory of 2676 1896 1433214838524ccdac23a9139c169cdd.exe 28 PID 1896 wrote to memory of 2676 1896 1433214838524ccdac23a9139c169cdd.exe 28 PID 1896 wrote to memory of 2676 1896 1433214838524ccdac23a9139c169cdd.exe 28 PID 1896 wrote to memory of 2432 1896 1433214838524ccdac23a9139c169cdd.exe 30 PID 1896 wrote to memory of 2432 1896 1433214838524ccdac23a9139c169cdd.exe 30 PID 1896 wrote to memory of 2432 1896 1433214838524ccdac23a9139c169cdd.exe 30 PID 1896 wrote to memory of 2432 1896 1433214838524ccdac23a9139c169cdd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe"C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exeC:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exeC:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5391a2842117881efb91731c1c45cf493
SHA1c829cd607f96f8f852d468c9441467028d542859
SHA256683e08b405ad9e70ef4552b141309c3a927e1f403b7f222f8e93b25d88c56347
SHA5128de0b711c77bb2e0626c4cbe8ab9e8ee5a2d03f198367c7a316f13718e4c8b1cf6c6a3089e940ee4f9ca2470e996df88bdcf088cead4f1ed186e7e580be5fa34
-
Filesize
1KB
MD55cecfe70a8f25a051bb3db9a5d218275
SHA16274a06f88730edce1c405c0b13c16e68e004e26
SHA2564131ec8c725d2a61f936e4d0daa064c4b6b2b2877a806b2421bc99ffcb48106d
SHA51205b82ca84a2a02d6e7b9d29179c05fb2589451ec413c72e53941f90cc1162569b02f6d14223f1bd2d198ba3dc797f6486df5b2816cc527773f180c48ee9d2359
-
Filesize
897B
MD5943e4841bb13a44b0e74462cc47c47a7
SHA12b36df30ad4316f45f890676c37aa1787edfc325
SHA25657a782cb878e62e6db15d6dc7c66ad9592bb476ce81024e3f43c742b6fd90ae4
SHA5129ecc8bdc09bc8bca7b0e31e77bfa57eecabd2ac8f8268dd9a127067b1efe3b3259d4633d98174297cfc19c77596051fbf9b6417ffea7ab700d562fcfd475dc82
-
Filesize
1KB
MD525227bdc3d0f9d3864c3ed63c8b6affe
SHA16a42102f27ad0614522432ec5013d31ff11fed97
SHA25618a8ae17e4cfa7ce8774b0dab67996f2d78520319cccf27bbddfb013714ac27a
SHA5126208e2e2741ce785d4d5046cf0662e6e0cd13b1f89289c5fe49529f26b242a2e6ef02c0a6266d2438103dd2b724d1018260b2b20afd63051283f8772c7b221b3