Analysis
-
max time kernel
43s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
2813182ff0fe9aac04061ae34e50e46a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2813182ff0fe9aac04061ae34e50e46a.exe
Resource
win10v2004-20231215-en
General
-
Target
2813182ff0fe9aac04061ae34e50e46a.exe
-
Size
169KB
-
MD5
2813182ff0fe9aac04061ae34e50e46a
-
SHA1
87582d30f52ff4cba32cfc7cc61c932abc07c35d
-
SHA256
e433c6107142cc43423215d77370bee93681a3aeb3621732639e522e2bf13dd7
-
SHA512
bdda66422711b1aca6e263511de3e35b6acb9f66bdce69b8b2ebb431187227d286777ffe2249c1d6244cb114ce8cc4a3680b085698e58df6f6a2f686d7b00722
-
SSDEEP
3072:3R6+m9GQe33q0bWE9D/HC1duZVIq5DgsKJpQohPAoXCYhI/Oua6H1yCSzAmZoa3w:3Rlm9je33/bWE9Da1dAVI4D6QKAgS/59
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\58003\\DB591.exe" 2813182ff0fe9aac04061ae34e50e46a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2360-1-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4784-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2360-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1604-179-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2360-180-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4784 2360 2813182ff0fe9aac04061ae34e50e46a.exe 92 PID 2360 wrote to memory of 4784 2360 2813182ff0fe9aac04061ae34e50e46a.exe 92 PID 2360 wrote to memory of 4784 2360 2813182ff0fe9aac04061ae34e50e46a.exe 92 PID 2360 wrote to memory of 1604 2360 2813182ff0fe9aac04061ae34e50e46a.exe 97 PID 2360 wrote to memory of 1604 2360 2813182ff0fe9aac04061ae34e50e46a.exe 97 PID 2360 wrote to memory of 1604 2360 2813182ff0fe9aac04061ae34e50e46a.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exe"C:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exeC:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exe startC:\Program Files (x86)\LP\91A5\BFE.exe%C:\Program Files (x86)\LP\91A52⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exeC:\Users\Admin\AppData\Local\Temp\2813182ff0fe9aac04061ae34e50e46a.exe startC:\Program Files (x86)\0349D\lvvm.exe%C:\Program Files (x86)\0349D2⤵PID:1604
-