Analysis
-
max time kernel
174s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2dcc2c9f28f1dca18435c420d414f1b8.exe
Resource
win7-20231215-en
General
-
Target
2dcc2c9f28f1dca18435c420d414f1b8.exe
-
Size
1.2MB
-
MD5
2dcc2c9f28f1dca18435c420d414f1b8
-
SHA1
9eaa9c82c3af8c549a9fc1e80f710016dbff1a46
-
SHA256
1058084af9f8546899f4e7f08dbeebe3e9e0860e0563c143b8cca9dcf50c7d01
-
SHA512
a5232b52333ae31f2e606bcccc1899f1df4ee36ad890877faf94474452b2433c2ed05957370c6bac4c911f37493dd9679f7fbad8a952eef77897446251e6132a
-
SSDEEP
24576:BEiFIUmVZXMRTX1dXi6kgaINVRX/diX2n0e435qkLeI+t2r48WJcYrKGdvbpGGO4:JFIUmzXoTX1dXiTcNjPdiGnT65qkYt22
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1548 tmppack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 2dcc2c9f28f1dca18435c420d414f1b8.exe 2744 2dcc2c9f28f1dca18435c420d414f1b8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1548 2744 2dcc2c9f28f1dca18435c420d414f1b8.exe 91 PID 2744 wrote to memory of 1548 2744 2dcc2c9f28f1dca18435c420d414f1b8.exe 91 PID 2744 wrote to memory of 1548 2744 2dcc2c9f28f1dca18435c420d414f1b8.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dcc2c9f28f1dca18435c420d414f1b8.exe"C:\Users\Admin\AppData\Local\Temp\2dcc2c9f28f1dca18435c420d414f1b8.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\DWQGAFVQKCDR\tmppack.exe-y2⤵
- Executes dropped EXE
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5070b8a8c886ee6376cfb3bd187641518
SHA16b942b7598f4c295ee08590b978cbd0633643551
SHA256afa9bfb2c067c7b78675ce4433419c69ae8b5be8aadedec3b938d07cf2f88dc3
SHA51296664d4bf1caa6932835079cd25b641eb3ed6e8b17eeccb3fe4672d65d2b626f11365aad02fd035476b8f68cd3196e723e1a4c93812d59b6c1eae57d13f7911f
-
Filesize
2KB
MD5622cf5896e2d6fbb78ba09634c900bd8
SHA137007bcdf40342407bbdbdaf6025b561df6a4ce0
SHA256e99361059f26cdf844731e1355d07072d37a7140ae86fe60717d4143bd374420
SHA512a8facf1a9a23d6cbae973b6e556cd28c31abdf4e2ed3280d607223d41f9ebed495041b0a6e12b79e144c6d2e79cbf64238dbb2d0d8ee257122e3953b429c12eb
-
Filesize
112KB
MD51e5a630c4c85483c6fb87a86c430e2f4
SHA12187dfbf3d4d7e65876f2cbeb25384f51ea46ccc
SHA25650f4b243b3043479e48f701667a2886141c71542a8e1f892badaf8d6935888e0
SHA5128f0bdd55b8f376cb69fbfa22f7adcee60bf89204ffb0fadc22c3e5fd9067ce3ad82db049ffa5be584a0f235b1701aff735d3f092b2bc64f53d5e6c5982aea70a
-
Filesize
718KB
MD507132df56fcc549cdb764a5030221f70
SHA1e3ad21a65c5d1511571dda82ac75050ebebe1390
SHA256e1d31f8bceee54e4e53ba3e876adc8758c82678cc3e7052b1f56dee6fd4fc099
SHA51277977fb6f869903fd9c67d5c796211e0c0c21bb8b9457e733e42c8fedae4fb5d32eb19b26c8bb9d4a9a462c268f4f8dd3577e6c48cb370b650036427a58fce82