Analysis
-
max time kernel
10s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
11db9a47d5187fd6c54a2854c833b9a9.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
11db9a47d5187fd6c54a2854c833b9a9.exe
-
Size
238KB
-
MD5
11db9a47d5187fd6c54a2854c833b9a9
-
SHA1
b4c5894430076a790c79ee678a309727f44ac85e
-
SHA256
774a2505dd0202a7d3324f4db217d25f6a5b892b30e5405adb4250fcb1fe3bc8
-
SHA512
1bb1160f7f94979999a51c4c6155c79d97f5452bf6eb7ccaca94f67b31783ece0f743d47ae58965f1908074bdb9c9c423eb7f6dc124a06e1bd1a26eaa3fd177d
-
SSDEEP
6144:13cnuDFBEx9JnBRdvAd6gSvA8tHYVW0ewTQxkOaB4YXd0:+nu5BExLBLa6gSvAcY/OalXe
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winexec32.txt 11db9a47d5187fd6c54a2854c833b9a9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2756 1924 WerFault.exe 17 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1912 1924 11db9a47d5187fd6c54a2854c833b9a9.exe 16 PID 1924 wrote to memory of 1912 1924 11db9a47d5187fd6c54a2854c833b9a9.exe 16 PID 1924 wrote to memory of 1912 1924 11db9a47d5187fd6c54a2854c833b9a9.exe 16 PID 1924 wrote to memory of 1912 1924 11db9a47d5187fd6c54a2854c833b9a9.exe 16 PID 1912 wrote to memory of 2140 1912 net.exe 15 PID 1912 wrote to memory of 2140 1912 net.exe 15 PID 1912 wrote to memory of 2140 1912 net.exe 15 PID 1912 wrote to memory of 2140 1912 net.exe 15
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess1⤵PID:2140
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess1⤵
- Suspicious use of WriteProcessMemory
PID:1912
-
C:\Users\Admin\AppData\Local\Temp\11db9a47d5187fd6c54a2854c833b9a9.exe"C:\Users\Admin\AppData\Local\Temp\11db9a47d5187fd6c54a2854c833b9a9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 4362⤵
- Program crash
PID:2756
-