Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
05e722cae151a6aa0eec327c16dc36cc.exe
Resource
win7-20231215-en
General
-
Target
05e722cae151a6aa0eec327c16dc36cc.exe
-
Size
1.6MB
-
MD5
05e722cae151a6aa0eec327c16dc36cc
-
SHA1
1a1d8f7bedceeb05f088e164f144a8c76389a905
-
SHA256
39ec888f14a32ee8d86e3b1a0fb537380ae7569ef8227830e9482ce068a74003
-
SHA512
3509362f988bed3229e096ccb1fede5d735c95741cdce92b1f98a7cc9ba4491985f90842b57b7df7abe80ff1734cff9ec16665250f265b88f6c5f82254c2cd39
-
SSDEEP
49152:wil10spOIUcuzvFWiFbFPIakEfREyqcjFBT4WDTtO3jnbIB:VlrnUcMWeE6jrThUjbs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3488 cookieman.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 05e722cae151a6aa0eec327c16dc36cc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 05e722cae151a6aa0eec327c16dc36cc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4812 05e722cae151a6aa0eec327c16dc36cc.exe 4812 05e722cae151a6aa0eec327c16dc36cc.exe 4812 05e722cae151a6aa0eec327c16dc36cc.exe 4812 05e722cae151a6aa0eec327c16dc36cc.exe 2120 05e722cae151a6aa0eec327c16dc36cc.exe 2120 05e722cae151a6aa0eec327c16dc36cc.exe 2120 05e722cae151a6aa0eec327c16dc36cc.exe 2120 05e722cae151a6aa0eec327c16dc36cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2120 05e722cae151a6aa0eec327c16dc36cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2120 4812 05e722cae151a6aa0eec327c16dc36cc.exe 40 PID 4812 wrote to memory of 2120 4812 05e722cae151a6aa0eec327c16dc36cc.exe 40 PID 4812 wrote to memory of 2120 4812 05e722cae151a6aa0eec327c16dc36cc.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e722cae151a6aa0eec327c16dc36cc.exe"C:\Users\Admin\AppData\Local\Temp\05e722cae151a6aa0eec327c16dc36cc.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\05e722cae151a6aa0eec327c16dc36cc.exe"C:\Users\Admin\AppData\Local\Temp\05e722cae151a6aa0eec327c16dc36cc.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_011102b00"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Users\Admin\AppData\LocalLow\cookieman.exe"C:\Users\Admin\AppData\LocalLow\cookieman.exe" /mode=read installiq.com3⤵
- Executes dropped EXE
PID:3488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD53f4519b56cb1e006dfe4341e72112913
SHA10ff5675d359c898b6a6bdc1dff10f71097bc9927
SHA256125adf4924899f2026436c0919853bb78b718c7cb6f2187148b01938b79388a2
SHA51278c0961f0828f32032c643f0e6ab59d1ca8b96bb891a74b0b255e1a1a63a0c581f486e9e16b070399e6365d1fb53464eb2b723932480b41a2df5e9f1eb89ab40
-
Filesize
45KB
MD5464785e8dc7a5ef92cb25009156d8f3e
SHA14a51dc06bf3532d2fc17c2f26bed30be9005afd0
SHA256fac1d0e85362f595a2d9aa27ec3b0c0f33a8c5eaae722fc63f102763d196a11d
SHA512319a0092641484dbf808c50e71d0faaf35b60d48584c852e23b0b45519e61f7103831c8c7abf6fb6b7cd002ef5cf388b719a3a049000808ac36e612541316a2b
-
Filesize
84B
MD5b9a0d4a56680e13113c8088a47036e16
SHA18d6c22bc1fa47b2a85c2f4592914048bd1d19624
SHA256965b09690fb9b09e521846400840927ffcf983b6275bb10d6e4c2600edf2c1f6
SHA5120678558b2a07a74a99733d39774cfe365d5a95983707f1cee7611480695063cb257da8b67155c00cf77d5e5d5fa764e7eac3c9ea04a0f03c044462dd61d8ce60