Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
12a1a6b5108d55e3f8b948762f1be10d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
12a1a6b5108d55e3f8b948762f1be10d.exe
Resource
win10v2004-20231215-en
General
-
Target
12a1a6b5108d55e3f8b948762f1be10d.exe
-
Size
180KB
-
MD5
12a1a6b5108d55e3f8b948762f1be10d
-
SHA1
9b5d1b0e26144a824837bf209144553af8be362d
-
SHA256
fd41d10abcf1d5febf2dbe9e4642137304325c34616bad6d483dcb5cc2f48f48
-
SHA512
ea2b272f3c6c0594bca4220d36176a78065ca53ede1f4e29bea0ec0417998dff2999b205bf7564e66893df6a1898ceeafb2ad9a430dad5d56431096c88ec12ac
-
SSDEEP
3072:imWVC2UXo0PzBTS6EPm0nb1aCdpOkPkIYJtQvBa9ZQHeGpGIsNYMjh3Xx5UPY:iZVC2wosUnb1NQ6ZpsZhGpuGMN3Dv
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/388-1-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5080-9-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/388-50-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4752-119-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/388-121-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/388-188-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/388-193-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 12a1a6b5108d55e3f8b948762f1be10d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 388 wrote to memory of 5080 388 12a1a6b5108d55e3f8b948762f1be10d.exe 91 PID 388 wrote to memory of 5080 388 12a1a6b5108d55e3f8b948762f1be10d.exe 91 PID 388 wrote to memory of 5080 388 12a1a6b5108d55e3f8b948762f1be10d.exe 91 PID 388 wrote to memory of 4752 388 12a1a6b5108d55e3f8b948762f1be10d.exe 95 PID 388 wrote to memory of 4752 388 12a1a6b5108d55e3f8b948762f1be10d.exe 95 PID 388 wrote to memory of 4752 388 12a1a6b5108d55e3f8b948762f1be10d.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exe"C:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exeC:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exeC:\Users\Admin\AppData\Local\Temp\12a1a6b5108d55e3f8b948762f1be10d.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:4752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD54e3d60df8799cc20b24aa984e022d382
SHA1b977ea8ef093fb9052b493beb611921e8667ce27
SHA25648cce161fef1261959d25a3d12bdae7b4c85a9d11fcba1260d57dac75bb436c8
SHA51222c3bad72189ecb3d2a57bfa9d2d0dace68e0a799311a78a9dfb2eec4f64cd408a23aed5da2e9dfddd96af0fe1099e98972d31414b5912a5dd6586ebf8f484a7
-
Filesize
600B
MD5c3fffe1ccd3c7ccd9371bc4b49fc3619
SHA179cf59aa8074136d487e74e7ea0139d88610593e
SHA25696d41945f9ba8e69c0b036f293d37bf63c327b502b9bbeb4f8d8f9044f227c96
SHA51210b44c57cb40fb66ce6358278dbc8426e304bc39f65ec54e8b3091731ba0035ee2d5b24e22673df4a660f6c83e4bdd083956dd042321c43c6232c536c055fbcd