Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
0d9f25321d2df308ddd0ea15af9307cf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d9f25321d2df308ddd0ea15af9307cf.exe
Resource
win10v2004-20231222-en
General
-
Target
0d9f25321d2df308ddd0ea15af9307cf.exe
-
Size
170KB
-
MD5
0d9f25321d2df308ddd0ea15af9307cf
-
SHA1
e30b01aa4b5b0999514aff7270c5457694be45f9
-
SHA256
202b13cc9badf57b2396fbd64d7e5c13f7025b50ee5cde19f23b66b7b3c90798
-
SHA512
30a4ee8a5d7e1d70332edcc814568d50fd6ff9646956ac463d16165683d4c4fbcaa11c46454047025074186916b26cdc1df9413644ba627cee01e98da149e5dc
-
SSDEEP
3072:RsuIsB8gZoLhaFyVs5Chw521meIfynYfE0/P2TfLzdLE13FUVLeL7Y4:6uzZoLhaBI4iXYs0/P2zdg11UVLeL7Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\297F0\\7C8E9.exe" 0d9f25321d2df308ddd0ea15af9307cf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/436-1-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4760-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4760-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/436-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/2380-174-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/436-176-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/436-293-0x0000000000400000-0x0000000000490000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 436 wrote to memory of 4760 436 0d9f25321d2df308ddd0ea15af9307cf.exe 91 PID 436 wrote to memory of 4760 436 0d9f25321d2df308ddd0ea15af9307cf.exe 91 PID 436 wrote to memory of 4760 436 0d9f25321d2df308ddd0ea15af9307cf.exe 91 PID 436 wrote to memory of 2380 436 0d9f25321d2df308ddd0ea15af9307cf.exe 95 PID 436 wrote to memory of 2380 436 0d9f25321d2df308ddd0ea15af9307cf.exe 95 PID 436 wrote to memory of 2380 436 0d9f25321d2df308ddd0ea15af9307cf.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exe"C:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exeC:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exe startC:\Program Files (x86)\LP\E962\8B5.exe%C:\Program Files (x86)\LP\E9622⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exeC:\Users\Admin\AppData\Local\Temp\0d9f25321d2df308ddd0ea15af9307cf.exe startC:\Program Files (x86)\F0B31\lvvm.exe%C:\Program Files (x86)\F0B312⤵PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5ff9a2d1a8457af6828c4a0290595a5f0
SHA1053788b5000637149f7e39e1d15eeb017450ffec
SHA25661d475b7ad6e5119345dfc347515f8f666f3fee6a39d7a377681614fcc5f6843
SHA512b68bb593e42ff3d3ac8fc36c9a4ba6f599d2175343bd15588483f7eb9b9e9bfd649a56adb0345ef9cc07498160116429bd02d5bfa25d5ee3d982d9b957eac683
-
Filesize
996B
MD5cb3bcf4f8d34bbf65d55c42d104a3485
SHA1f0c37940363418941a813b8e32fd7141684c9493
SHA256aee52cd4856cb37fb11f78f80d87c432600fe94653494a2c07f9d64e0341fb52
SHA512128cd73ed82c71b1d4e47c363ae00da565ac0f5bd5bca81461aa9dbeb6a6d8a8a79c44ab7daeddee0d4eda8259604203563a1700f4d31bbb0913a723d69beeb2
-
Filesize
1KB
MD55d9fd1b7c85acff60621b198a55c063f
SHA1123ab6f2f72f99dac3458668be0d79ba28132417
SHA256c879a323b21bf570f2b31062af3c86b363074d144b220398ac99b7afd8fcaa63
SHA5127a61954ed542f077c39aae0c79f90a0b661b257e2e369d44d211a0a51bbe9bd45544c8d038ed0cc556ee6f1ccd6c673bfbcd667120d591c4865c64f78862d79c