Analysis
-
max time kernel
143s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 03:23
Static task
static1
Behavioral task
behavioral1
Sample
02c9b93a30cac707fcf002a0de796ffa.exe
Resource
win7-20231215-en
General
-
Target
02c9b93a30cac707fcf002a0de796ffa.exe
-
Size
2.2MB
-
MD5
02c9b93a30cac707fcf002a0de796ffa
-
SHA1
bfdc0777ef4d84a248045919fae0e2fc9ba33952
-
SHA256
d580e3cc2480f082f140cc784c0249f19d0c412d7758fb97ba8e750441188bb6
-
SHA512
05fde0d4e1afbc0e5d3d7315fee4016caf5a5ed8f2365062cbb8588fb7552d8fd999a82e8f2360336b77bd0ffc9eb39c62aca5992e709f781f80e64bf561feb7
-
SSDEEP
49152:QwoR6eo4uwBM3RlNpDE15UR43WNKrAdlK4MI0Q:qNokMBlLDE1W+uuAIJ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 freegeoip.app 22 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
02c9b93a30cac707fcf002a0de796ffa.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 02c9b93a30cac707fcf002a0de796ffa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 02c9b93a30cac707fcf002a0de796ffa.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
02c9b93a30cac707fcf002a0de796ffa.exepid process 3084 02c9b93a30cac707fcf002a0de796ffa.exe 3084 02c9b93a30cac707fcf002a0de796ffa.exe 3084 02c9b93a30cac707fcf002a0de796ffa.exe 3084 02c9b93a30cac707fcf002a0de796ffa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
02c9b93a30cac707fcf002a0de796ffa.exedescription pid process Token: SeDebugPrivilege 3084 02c9b93a30cac707fcf002a0de796ffa.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462B
MD590ea503fa9dcc8385d943cb71d5bddce
SHA1075625c46872f21e3c709b6841cfbb30b35cb9c8
SHA256af7d487e7970567dc3d1dcb29ed2b22f6e1b06b8076e23493b756762ce97e0ae
SHA512110925ffff39f217046c7d2989a129ccdac3b6ba76c71506a9d07f7b7379b95553becb3fe61d5e60b8188f015de4143f2a5c1be9466220bebd9c3da0f6280d21
-
Filesize
1KB
MD591c840dae8efd83d01f670141b52f398
SHA12af3695b38f6b58c051cb6837bd723154b9b012e
SHA256c4f8159cfdc8443176c562943a9da07477192886e9108af57b1c9f4f3d081648
SHA512c1dc203dfc1bc622acb8964168b44e0cea63ad9fa0ff7d9711280452c7eb1f9fa97a3a90a4b3ce1bd1d358d9dd7eafe2d89e37999d9a22b0ae42e4e7b2814ffd