Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
0cfb88b326a7ef02e31deee555843d3d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cfb88b326a7ef02e31deee555843d3d.exe
Resource
win10v2004-20231215-en
General
-
Target
0cfb88b326a7ef02e31deee555843d3d.exe
-
Size
188KB
-
MD5
0cfb88b326a7ef02e31deee555843d3d
-
SHA1
474a6b1af705b95ea73932757ff9fd9d9e282a96
-
SHA256
e83bc387be36d232f5f2b991bf5769de442252a48aac528753c24a9a158840fd
-
SHA512
b0d187f1908d30a6a9460389fefab5a2707ea7b5548d53c64ee7cd58b0e977914af956c3a0d63d2ea9bc78f820538be3ade2ef186a61eaf11e786d67ca34b634
-
SSDEEP
3072:fmyBaLbIsfawmi1Z6HTe0Lnf60ymKEJZHouvG5w3UqK1Vm76ok0UaIB6a:5mImaHa0Lni0pKA9FOrXzbZ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/356-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1628-5-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1628-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/356-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2900-77-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/356-178-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/356-205-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 356 wrote to memory of 1628 356 0cfb88b326a7ef02e31deee555843d3d.exe 28 PID 356 wrote to memory of 1628 356 0cfb88b326a7ef02e31deee555843d3d.exe 28 PID 356 wrote to memory of 1628 356 0cfb88b326a7ef02e31deee555843d3d.exe 28 PID 356 wrote to memory of 1628 356 0cfb88b326a7ef02e31deee555843d3d.exe 28 PID 356 wrote to memory of 2900 356 0cfb88b326a7ef02e31deee555843d3d.exe 30 PID 356 wrote to memory of 2900 356 0cfb88b326a7ef02e31deee555843d3d.exe 30 PID 356 wrote to memory of 2900 356 0cfb88b326a7ef02e31deee555843d3d.exe 30 PID 356 wrote to memory of 2900 356 0cfb88b326a7ef02e31deee555843d3d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exe"C:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exeC:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exeC:\Users\Admin\AppData\Local\Temp\0cfb88b326a7ef02e31deee555843d3d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576a5026917cf3878f7827f31bfb19367
SHA173d4b0533352b1137f8d16ddd21f2694e3cffb8d
SHA256acc174841b7845320e14364e4ae4150c30d5b5bada7289bec3d416ae35eba0eb
SHA512681f54c469212fb14f0383651f162e61a763dee59ffd60da60a56d0be5a1ef9075bdc082f82af6e3adfbb01ae0c02190e56c9bda498bbbb1d4d6d2388f52169b
-
Filesize
600B
MD593811919ffd5fc8e8a6cdb94cde4000f
SHA1c020864934aac73f7749e3272454cb39b852cda7
SHA256105237af74df3a427d3014d9f3b3d73293c06c36c2a6b0a773d49de4a99ccdd8
SHA5125d012f1cab7eaf1ac0ba34e9cad371e136022f33cca60fc44c4d22cb869b56a1b437d6871a4eb20ec2a4319767322ca4bb811ead8ccf38875414bdc4a6756cef
-
Filesize
996B
MD5773d9a92bb986403f1ab39092cc8f05c
SHA1b6eeee00a2bd852991678d94d6b1c0cbc8c429c1
SHA2561a10ec10904dd63836e5ffe3652499c931dbfb23224450e9452fa0e7ea9fa9ca
SHA512e7adb2660729e23f876c65804a7bd45f111eae56d30697a6e1e7c81e898e0750240ed9c8e867a9e0ecd0617216e48986fa0b005bf5b9ae85f04a01e36b31a798