Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
11db9a47d5187fd6c54a2854c833b9a9.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
11db9a47d5187fd6c54a2854c833b9a9.exe
-
Size
238KB
-
MD5
11db9a47d5187fd6c54a2854c833b9a9
-
SHA1
b4c5894430076a790c79ee678a309727f44ac85e
-
SHA256
774a2505dd0202a7d3324f4db217d25f6a5b892b30e5405adb4250fcb1fe3bc8
-
SHA512
1bb1160f7f94979999a51c4c6155c79d97f5452bf6eb7ccaca94f67b31783ece0f743d47ae58965f1908074bdb9c9c423eb7f6dc124a06e1bd1a26eaa3fd177d
-
SSDEEP
6144:13cnuDFBEx9JnBRdvAd6gSvA8tHYVW0ewTQxkOaB4YXd0:+nu5BExLBLa6gSvAcY/OalXe
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winexec32.txt 11db9a47d5187fd6c54a2854c833b9a9.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1724 2028 11db9a47d5187fd6c54a2854c833b9a9.exe 89 PID 2028 wrote to memory of 1724 2028 11db9a47d5187fd6c54a2854c833b9a9.exe 89 PID 2028 wrote to memory of 1724 2028 11db9a47d5187fd6c54a2854c833b9a9.exe 89 PID 1724 wrote to memory of 3556 1724 net.exe 92 PID 1724 wrote to memory of 3556 1724 net.exe 92 PID 1724 wrote to memory of 3556 1724 net.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\11db9a47d5187fd6c54a2854c833b9a9.exe"C:\Users\Admin\AppData\Local\Temp\11db9a47d5187fd6c54a2854c833b9a9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:3556
-
-