Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
14383da54e2eee5090ae777d3c38bb3b.exe
Resource
win7-20231129-en
General
-
Target
14383da54e2eee5090ae777d3c38bb3b.exe
-
Size
910KB
-
MD5
14383da54e2eee5090ae777d3c38bb3b
-
SHA1
ad679837ddb1138a8f065b537916d487df959e58
-
SHA256
208784f4cd74fd614325a22aa3cfdc54c0a05af92d0763a88d5e00ca143fadef
-
SHA512
7fa0316342867587552860bfb8a091a392e41a62a806c93eb08009b29da81dde680ec2e40e4eca463744e2991bb4bee46bd9d86c22bd93b950ef92149f8e0b93
-
SSDEEP
12288:uEuzhqYUV/xYymN+1E1mclkjtx+ZMNns++6FLn/CldjKJAKETqA:uFNc2vN+YEjtiGFTFLKldj0lE9
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3516 228 WerFault.exe 14 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\14383da54e2eee5090ae777d3c38bb3b.exe = "11000" 14383da54e2eee5090ae777d3c38bb3b.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe 228 14383da54e2eee5090ae777d3c38bb3b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14383da54e2eee5090ae777d3c38bb3b.exe"C:\Users\Admin\AppData\Local\Temp\14383da54e2eee5090ae777d3c38bb3b.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 34762⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 228 -ip 2281⤵PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5d51a638c89fa5be92a87a1eb910078d6
SHA134a0f17a71a4a9db3869da8258e4dc2d9e8696f4
SHA25649bb5484a59fb9fa975bff6b211f689b20b9aca4ac26ccc128ec260906dd7527
SHA51223390235567ff575681b02d84ed4ce7b4fe29a3b23c54750efac5e7acd703f031d46ed837ba8eb6be3e84d176906753096bc8f479fe4ebe05f0c9a1e65e167e2
-
Filesize
222KB
MD567613f043910d779593d21ba98a3d1f8
SHA1860f322825883cdcc0d967ac6769ac8be7371a71
SHA2561f07a92f8f02857d11bab6577992a690e1900eda53998c133609f0cd9146b2d1
SHA512389f824c03795bb28f465d0b48a35e110a88a5c710e229f13507b73b1a6db1f1a867400ca73598897770084890caddd3e7321e104fc716472a92cd707eda9a31
-
Filesize
5KB
MD5dc97ff133e028759df5f5cb1614252b4
SHA167ab60e8bf101176f62007558a4063deb5b0f993
SHA25631126e10bb189aa23ad62f61dbe8ac09abdc47c4065a44fac97918da5bbc14c6
SHA5122102a8508175bd387aa75388a56b66e97558ea855a57a195ea5d2786661176018a796ec5d5ffaa86dcdd5d8b560ad1f998138c3382a8a90715136886ffbccb88
-
Filesize
17KB
MD562008374a494afeea2ee2ae9eee4c8c0
SHA194808fcf0748c437f4d7ffa4d540e054cb014fab
SHA2569c4affddfa97b268b07c00ac28a2fe617dda806bf55088ccf348da149ee76c1a
SHA512f584ed647b69ff8ff80450be8f0b267ebb3c97826dbf01d078165ea94b43afd1f00fc58b91d9e8f4d78465d70312c1b1a6ac66583ebdc009b0ce471a6cf149a0
-
Filesize
93KB
MD5686f188e12912f4476ed574af668803a
SHA1a40b65e65fd8e025a439683be899da0fe4f59870
SHA256d95377e8f03605bb066bbb23e0b79123c222154873a2fdc7979b3991cfb248f9
SHA51223ddcc9ef3946711c6e54ff7edb3a12cd4155adfe5d4721e1a19305a4aae078291c5e8e617a5d292c77e3784b0088f50324f09e784527d70ff81b17b1ab564bd
-
Filesize
86KB
MD5607f9bbc58dc05589a106cdfd86429b9
SHA18b2783bdb36be9d8bc4fd6c2b9d862d51519bf89
SHA25679789f5f50aefb54481377e1658c7b39035d5f1f20959399d3eab1573e9c4da4
SHA512dfb981ac01a526350bf3581c62b7b73ba27cad7e2a5d2d0d1e62083bd759ce52cbd858a8c940805893f735355e6302666885a508a3832c84ce8bdfa1e4e0f6b3