Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
034c765777a259d37ce8b1d99d05f591.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
034c765777a259d37ce8b1d99d05f591.exe
Resource
win10v2004-20231222-en
General
-
Target
034c765777a259d37ce8b1d99d05f591.exe
-
Size
176KB
-
MD5
034c765777a259d37ce8b1d99d05f591
-
SHA1
552ae3967e50390f06223ceb6f40c06ca45cc9b4
-
SHA256
58972b9fb856a756ce1e738c42bc15e17df4aa378c4e05aea6f2253d0c3038bc
-
SHA512
46ee2b3ac6d9d6749bca0a61ce5bdb39d4cea18bc0f5e8ae87a0bd0f903cab8846b8e729523030cf5eca9b57787c4c6082017e3a10b6bef55c40fdb07f22723c
-
SSDEEP
3072:xWVQsT+LfbtELxHiDRTlTb1W2suH/ufpwEbpCaY6rXAyd4y8JoZSpLcC4jErjO:nsTObtELxH8n13/HGfrp7Y67Ayd4y8Jk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\17F75\\00071.exe" 034c765777a259d37ce8b1d99d05f591.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2312-1-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2832-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2312-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1080-117-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2312-119-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1080-222-0x0000000001E00000-0x0000000001F00000-memory.dmp upx behavioral1/memory/2312-271-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2312-272-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2832 2312 034c765777a259d37ce8b1d99d05f591.exe 28 PID 2312 wrote to memory of 2832 2312 034c765777a259d37ce8b1d99d05f591.exe 28 PID 2312 wrote to memory of 2832 2312 034c765777a259d37ce8b1d99d05f591.exe 28 PID 2312 wrote to memory of 2832 2312 034c765777a259d37ce8b1d99d05f591.exe 28 PID 2312 wrote to memory of 1080 2312 034c765777a259d37ce8b1d99d05f591.exe 30 PID 2312 wrote to memory of 1080 2312 034c765777a259d37ce8b1d99d05f591.exe 30 PID 2312 wrote to memory of 1080 2312 034c765777a259d37ce8b1d99d05f591.exe 30 PID 2312 wrote to memory of 1080 2312 034c765777a259d37ce8b1d99d05f591.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe"C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exeC:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe startC:\Program Files (x86)\LP\71E1\5CD.exe%C:\Program Files (x86)\LP\71E12⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exeC:\Users\Admin\AppData\Local\Temp\034c765777a259d37ce8b1d99d05f591.exe startC:\Program Files (x86)\75CA5\lvvm.exe%C:\Program Files (x86)\75CA52⤵PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5ed343d3183f47f870520ee780804ac4d
SHA175795351b9d7eb82a7a4416f48d97c3433a043f5
SHA256b89d55894493a0408a0c5f2c269fb54344ae812eb40621462fa56ff3137c49a6
SHA512ca66b37efc9c81a8fadf0afbebe4e2eea342a6aebd2c534a9780b8767ecc9f41c798c6af30d341b9d1cfebd15faec19c064eebf2f9f5eda34ad7aac9308ad91a
-
Filesize
600B
MD55c86abfbc24975887418e977d09ff104
SHA1184f591c069c46519fc72d45938dafd64d8775a6
SHA2569869172a06a08c4caad9b6ed2862d3f26cf39dee4e3a96fb4a2e61b3635a894b
SHA512e5f2886e10a583946e17046400aa2e64e14d7482c5016c0d5830fbe27647b8c23a7e817ab4eb3f7b3bd6c94f93c872f58724ad410deff91cb811d59d102e95b0
-
Filesize
1KB
MD5d46d1d57282bd92de4b429423bfaf518
SHA13ebdd4107f3b99222ca161bc560991531399838b
SHA256abcb9081ddeaa56168a9d2ce69208dbf7d55ca6cde1ad16c2ed04adadd2e65f6
SHA512171fac235a80ad969b894ae8a8e7f533f6a3eb7667494c09cb43c177f2814c266746cd6c462ebd8da7b245a1b39015a0d04edaf1d168c6b195e2b633e1e3df91
-
Filesize
300B
MD51135d1ce37d26c34be82491ee6a444e5
SHA115eba933473f64cf0d8b6aaee5237b64753deff0
SHA256f7f29f2008d875fd37977ec957ab2e8b21527a79f692e8ac81a526b3d48df47b
SHA51249431140082dde9eb45850ed36e9307708605388ac0442f34e8aa0951d841f3b525f020c5a39c8795c70d3b3ac484ceb347989bf44ccfd9a6b5a4773d371e6b2