Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:29
Behavioral task
behavioral1
Sample
0537ae629583f68cc2bc00efc59d7e55.exe
Resource
win7-20231215-en
General
-
Target
0537ae629583f68cc2bc00efc59d7e55.exe
-
Size
909KB
-
MD5
0537ae629583f68cc2bc00efc59d7e55
-
SHA1
9d86faf729616d0ae13b073e2f73e674417536c4
-
SHA256
06c34394aaa10f88ab6c755fe8fc3846dcad360850a67d037abd9804d07b30bb
-
SHA512
6ce90cd0ba091b1f25b991add4ab5e70912d927c1facc011ff484a04cb1a36e1927c3ee7dd50294223b09a013e0b0bdfa64bb87a7927ceffc8227e666e939f88
-
SSDEEP
24576:uQXz088WLzxDfgM1uylEjlISKfqrx0OGO31g7+RO:tXzkWxMQlgI/fJOq64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 setup.exe -
Loads dropped DLL 10 IoCs
pid Process 1712 0537ae629583f68cc2bc00efc59d7e55.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1712-0-0x00000000009A0000-0x0000000000C51000-memory.dmp upx behavioral1/files/0x000d00000001232d-2.dat upx behavioral1/memory/1712-4-0x0000000002750000-0x0000000002A01000-memory.dmp upx behavioral1/files/0x000d00000001232d-8.dat upx behavioral1/memory/1616-9-0x0000000000810000-0x0000000000AC1000-memory.dmp upx behavioral1/memory/1712-7-0x00000000009A0000-0x0000000000C51000-memory.dmp upx behavioral1/files/0x000d00000001232d-6.dat upx behavioral1/files/0x000d00000001232d-18.dat upx behavioral1/files/0x000d00000001232d-17.dat upx behavioral1/files/0x000d00000001232d-16.dat upx behavioral1/files/0x000d00000001232d-15.dat upx behavioral1/memory/1616-23-0x0000000000810000-0x0000000000AC1000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3000 1616 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1712 0537ae629583f68cc2bc00efc59d7e55.exe 1712 0537ae629583f68cc2bc00efc59d7e55.exe 1616 setup.exe 1616 setup.exe 1616 setup.exe 1616 setup.exe 1616 setup.exe 1616 setup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1712 wrote to memory of 1616 1712 0537ae629583f68cc2bc00efc59d7e55.exe 28 PID 1616 wrote to memory of 3000 1616 setup.exe 29 PID 1616 wrote to memory of 3000 1616 setup.exe 29 PID 1616 wrote to memory of 3000 1616 setup.exe 29 PID 1616 wrote to memory of 3000 1616 setup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0537ae629583f68cc2bc00efc59d7e55.exe"C:\Users\Admin\AppData\Local\Temp\0537ae629583f68cc2bc00efc59d7e55.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 4683⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5b29812de29cf7a17623ba135244f6786
SHA1dd3f260797196cfae14ed53cd23f4d2fc667cdb1
SHA256f50cdde1bcecec1adfacdd70b02b8cb42421493f031ed8a286298c48f7f03dc2
SHA512722a610807e3ce7ca1d4653cd9e64ef3b4b6f40b48718e30c96f17188acc2fe32f07c5985a02247e6d261f15385103087856b2f48c1e8be373991c7e4099805a
-
Filesize
411KB
MD5eda7162c985f69dac8ecd44f8cf09e5c
SHA1c2a5113ce91836c432f95e43e7d633d1a9ceaeae
SHA256bffe3471870802f9e41abbda1fe8d7386d0f0a9f68278159e26ef23af0c5283a
SHA512576e9e6e10d898c9d74afdcce8efee4fbed20bf02657e21cca36d967be1ed0151297af2b090a24e1bcd6a99d523342b449c8494fa6af7cc34e2b557df9ac366f
-
Filesize
489KB
MD51dd1d4f4989ba418094d0d372607277a
SHA19afb60acd7ec8f34945f7ff63ffdd8ef64e36b04
SHA256453ad1d6d1aa8ba07710581c4b8c19579b8c3cc0066bef2b36f836e10b79a48d
SHA51212981064d2f3962e3b1b55a18d6c122598a95cccad8d40087c6614615002e2ef948d48e0565a6073ba3202e0dac7e3e60fb774027240c476637c31fda5c505ec
-
Filesize
156KB
MD53f17262b6c126d55d747120da4c95b6c
SHA16bd2f05a350911571445d51669e6915e6f614689
SHA256d47375eb29d321f3f6327ea7b62600400cac1d6567a166a848aec6da7c51c202
SHA512b4d702750ac3fd91fec302fd001ff763318a3cc8757fa518154d8cbeed69f4c143b2d0a8efe4cd503793c57d03d2f3ee8d33878894a6f7787e1a6a24b0211c7a
-
Filesize
223KB
MD53bd860b5b4758eeb18a014c755dac98c
SHA131c86b289c43ed021b335f9ae8dfcd4260ba9c0a
SHA256c25524873c8c46640d875468417ae1f3006c7bd1d858443b2872d55d89b9dd95
SHA512f036157c8d39bc61a0b30371428f0fd53717637c99a4e126bb040dcb01552cfb7492a2d40ef9a4cf00cb0e0f8eaf445d793970bef3c04b8938cdd5fdc28d3687
-
Filesize
909KB
MD50537ae629583f68cc2bc00efc59d7e55
SHA19d86faf729616d0ae13b073e2f73e674417536c4
SHA25606c34394aaa10f88ab6c755fe8fc3846dcad360850a67d037abd9804d07b30bb
SHA5126ce90cd0ba091b1f25b991add4ab5e70912d927c1facc011ff484a04cb1a36e1927c3ee7dd50294223b09a013e0b0bdfa64bb87a7927ceffc8227e666e939f88