Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:33
Static task
static1
Behavioral task
behavioral1
Sample
220c0862f0055b753bfdcf07f5a3a7e9.exe
Resource
win7-20231129-en
General
-
Target
220c0862f0055b753bfdcf07f5a3a7e9.exe
-
Size
1.1MB
-
MD5
220c0862f0055b753bfdcf07f5a3a7e9
-
SHA1
f1ed2d2cddf71626e0549a0f0a1e0308f6b1017d
-
SHA256
8bf50bca5d98c3fae67d26d4d036ab444ed3deca17a17e2d6eac348f4535a97e
-
SHA512
fd9809f2c0f1329cca4ced5ef6d8c2f07764f707004e1c54a6e7812945bd59c8f4a7ffb882b23be26b4301a846ab00476088f861622b8137c251b480912e5307
-
SSDEEP
24576:Gbbw6GMqgR/2VRTUzXTZHdmhqejX0CoXKSxMXTnP9:GbWMqgR/kUzXTOh1jX0ySxa
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240643875.log 220c0862f0055b753bfdcf07f5a3a7e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 2620 220c0862f0055b753bfdcf07f5a3a7e9.exe 2620 220c0862f0055b753bfdcf07f5a3a7e9.exe 2620 220c0862f0055b753bfdcf07f5a3a7e9.exe 2620 220c0862f0055b753bfdcf07f5a3a7e9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2620 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 91 PID 1828 wrote to memory of 2620 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 91 PID 1828 wrote to memory of 2620 1828 220c0862f0055b753bfdcf07f5a3a7e9.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\220c0862f0055b753bfdcf07f5a3a7e9.exe"C:\Users\Admin\AppData\Local\Temp\220c0862f0055b753bfdcf07f5a3a7e9.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\220c0862f0055b753bfdcf07f5a3a7e9.exe"C:\Users\Admin\AppData\Local\Temp\220c0862f0055b753bfdcf07f5a3a7e9.exe" /_ShowProgress2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
1KB
MD58467dcefbc349082158e2db536817642
SHA1843ad7fbe1951eae3abd775222c26600589d0e09
SHA256af2c1316bc809a488de12e15169720342d065fc0d970e36d611c4b583a3aeb38
SHA5123d355ebb363d0cbd2053ad80c3bf60ebb5db006eab01bf11c8ba4288aa9b7c6ee40a1c2a0dc52a8ed595626b2fbfe9795e918b7276975909350faaa21aa141a0
-
Filesize
4KB
MD5017c83af9aaef5369797ffe4bba779b9
SHA1641e65ac7be9eb43adb74dc898c75e4f74a7fb7d
SHA25614d3ceab75ea4dfc11c0ba5b3abba8be016a8954ebe97b3e2087dc0b5a3c6f88
SHA51295f7cfd4a065ed01a9210e6303a205e58c82c00e7e13482e85723345af27a3357950426f3883fa6d79bc399a5635a5ec04c6c4b1e2d2ab34fc7300b30fbbe4a2
-
Filesize
318B
MD510c359bc980927bb66b215407ece3e66
SHA14a2fc034bf7b4e84d832b6bbd9413d2055b9ec62
SHA2565b12769a75d1c755a284a73e1b8422f73d6223c23b72e5bce698c17f50185aa8
SHA512ed707c6bbf5023aa147571d9d186e8348b11da6fb462de69e4135480f2e10081c416c80745411752797401660221e2040e624b5a6d3e1a57ba59cdcc009eb16c
-
Filesize
417B
MD537e1ff96e084ec201f0d95feef4d5e94
SHA14ec405f2668d5d93260525ad916abafa2414cb72
SHA2568e806f5b94fc294e918503c8053ef1284e4f4b1e02c7da4f4635e33ec33e0534
SHA5121a8a27a92abe35edaa2c950b130579c92f0d0d87b09971843c39569cf06d407b8e896751e73452676bfad45a363f0b6dd00cb6c5faf33966880539e106b19f94
-
Filesize
190B
MD564773c6b0e3413c81aebc46cce8c9318
SHA150f84ef8331341b48981af82313b146863eba526
SHA256b09504c1bf0486d3ec46500592b178a3a6c39284672af8815c3687cc3d29560d
SHA51203e96bef74c0b3a31124c3d3c1bb78af1053a8719ca373c6b9316d63bac9545c1f4ecc2d747eb64341d8da31bc0f23da094e19c3e07ed46f65c28dc88e13bd3a
-
Filesize
632B
MD58f6a2e09ace79158461b82d74ff6c7fd
SHA188f079fd001feb2cb302565b87fdb81c8995dd93
SHA256b4bee76334ab9b4b0bdd2bff1b3f3a7b30d2e758bb8d4c6e457c9594bb62960c
SHA512869305ea12f21564e56882fef318cdc21f88715f894e8140ae6b2cf3137a4c2002a34f2f8ae2719f770e2d0c892244b5e5f3229f1382e799dd309f52657cb98e
-
Filesize
20KB
MD594d82a50272a4423dca66ae32e0602ca
SHA118a1300c684442bffb41dcba54d30c72888f48ec
SHA25603903399fb31a966050a305d95f585b4d95118eccd9e05a866ac9cdfc7dcbe9f
SHA51265ccc863b46fedfe5d1e4089cf4bc93a6248f0263266639bde133b416f58e9eb8765a7b15088173470cde1db68ec536bdf65563eba82020d363cb7b2cae18f33
-
Filesize
266B
MD50e0aead9873f985325c78c564830b2da
SHA1339d70c35d53f322908be28dd80002379b739921
SHA256bf07069ae477cdfbcbf2541c15f1c8b0cca5158d288ea3c0f86485bd45cefd98
SHA51296d6f1edeaf4b7e76fb76fda7e14fe9dca86f21f3a1281d5445603a8b52f5201013a82541c1d1887c1cb36de7cb61c1a3a5cc93f1deeaec4c680c3eabff6008c
-
Filesize
1KB
MD5c5d63a3d40ff748895cf763749e8b931
SHA1b3b4248e492727690c2adc7306a8ea0cd675b2ef
SHA256226abf53c68832d2f353baf5f6c4b22464571cf247e4b811b9e736a0712250e1
SHA51257a8d996b853b0b756840079f47b10c0a5f56cd6ad330dfd82e8609e4f10cea26a7934e1635cf0db0ca4801600b6b25f71f443f4158a8b77c08b3cd75fe25774
-
Filesize
1KB
MD583487401daf307d6c726a479de1ee6f9
SHA1c173be4937a63672570078b325864c76b28040b8
SHA256f4f0f59fccd9b87b208b416423797dcfb532472dcfef99bef41a11ea9f6f713b
SHA512da69729b6682acd1c46587c7c3b4533d9afbcf84c17e55f43798f1fee0097c7a2f39860e6dbc6a9b1cb26dc63d9afab4511071981ad5fd494f36ad9659c56e50
-
Filesize
2KB
MD5e37ec66b72996fc3ad929cd068570d4d
SHA1e21be5ea412b4dc02b7d3a61ab3a798946224cae
SHA256bb4c9ad7ce53b3f958f800f9f04200c0f70542a60e97bba8bdffe7d32dfe9ad4
SHA512f0973de78b2299fa4116ebefb6944b0a02ff8b8e568eb8e1967b7939a041b31c09e166fc3a33b1ed74c143236b5e0faa7c3905db831b9c262e0de0af9211b9e6
-
Filesize
3KB
MD5b460d82eab7af8ba6e338e351dd0ecdc
SHA1265b9a3f3c80f40f8534ddcfbf9c1ed61e3b1b20
SHA25647a4ac193b9bdfe15d0b8a95370823739c2ae4f6ebf2015e1412b880cde6b81d
SHA512e3add5d91a61da7f64c7860e6303344f37cd49e2fde15c677924d133fec607dfe4ab4d99ec8a3322587b0b186a58e71fcd326e67057a6ff7ef80ad8ed3f0e63e
-
Filesize
2KB
MD5274548cb843bb96fcb50a79a2340b22d
SHA1bb5253c868861ff10fd48dcce1309d847f087e80
SHA256d4c02b2a0debcdd1689bcfbc7987826deeb6ec10806d5dd6500def9cd901735d
SHA512a0117381f58b6b741b049dbb5eadb5917c4199002a73c62890c30cf5759bdf09e8a163e413dc8459dc0dbe0c2cef35d5d5d4653c3646a7214495ae51a4c0d538
-
Filesize
176B
MD5192b249d9413082d676f85d1509fe258
SHA14130ba10d3bb2267f19fa07dc0672e6ba23a8c4e
SHA256b97788b954e0f774c72a3a5bf9e50031e0bffbd8185d05fe443a8f47cafc0660
SHA51275955b892ae19c31b3180d58adc103292fc5dc764b9932b145464021aad347cfdcc5524b24712feb4f611aaa9f375a0088a194a072cf846f1fe625236ac1b82d