Analysis
-
max time kernel
0s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
207315bb378fc8ffd37d0792d0082a69.exe
Resource
win7-20231215-en
General
-
Target
207315bb378fc8ffd37d0792d0082a69.exe
-
Size
658KB
-
MD5
207315bb378fc8ffd37d0792d0082a69
-
SHA1
c908dd071a4ad4d591191ee8b31aa07bd3c4056e
-
SHA256
943797d2243c3e296e2f7f1eae9d75e76cee45440e88759785460399d617a1a7
-
SHA512
fe447092786bd237ddbe0049b1cd17eb996afa6e13cf916fbf242efc197bb721f25fb0fbfa362c33d301af91da4c09581c64a768c04e6cfd0e5e543a4cd9b80d
-
SSDEEP
12288:JEZuujhRTpGVWg6W0LewG6tU/ZYIdfVKkJQxHXzNWNXCgWH35Y:JHujLTk/6p5qnKkYHjNW9DUy
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4960 207315bb378fc8ffd37d0792d0082a69.exe 4960 207315bb378fc8ffd37d0792d0082a69.exe 4960 207315bb378fc8ffd37d0792d0082a69.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4856 4960 WerFault.exe 14 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 207315bb378fc8ffd37d0792d0082a69.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\207315bb378fc8ffd37d0792d0082a69.exe = "11000" 207315bb378fc8ffd37d0792d0082a69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\207315bb378fc8ffd37d0792d0082a69.exe"C:\Users\Admin\AppData\Local\Temp\207315bb378fc8ffd37d0792d0082a69.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 29802⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4960 -ip 49601⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5dc97ff133e028759df5f5cb1614252b4
SHA167ab60e8bf101176f62007558a4063deb5b0f993
SHA25631126e10bb189aa23ad62f61dbe8ac09abdc47c4065a44fac97918da5bbc14c6
SHA5122102a8508175bd387aa75388a56b66e97558ea855a57a195ea5d2786661176018a796ec5d5ffaa86dcdd5d8b560ad1f998138c3382a8a90715136886ffbccb88