Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:08
Static task
static1
Behavioral task
behavioral1
Sample
335b01a38b8f5f557094dd9cfe1d748c.exe
Resource
win7-20231215-en
General
-
Target
335b01a38b8f5f557094dd9cfe1d748c.exe
-
Size
1002KB
-
MD5
335b01a38b8f5f557094dd9cfe1d748c
-
SHA1
d43ff241b2dded8db09f959f2e29ba0226412e08
-
SHA256
3e6d98dfa9e0f27421888a5356e598bdfe72c317b3fad2be2a3d912be12e22e0
-
SHA512
8a17306b99af61e1909b9066db18aabc6de52d935b4a7d27ffa1f34b388619428cfdf8b23d8437da313d7df6b2c6503556c5f5e52c360d61512e446b6bbb4520
-
SSDEEP
24576:LzsjkZczo63M87odbJd5A8uvKXtvKouHPf4xVvCI:PsloTY4bSDvKXtvKDvgxVvr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2352 215AppsChecker.exe 2128 dlhelpdl.exe -
Loads dropped DLL 46 IoCs
pid Process 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2352 215AppsChecker.exe 2352 215AppsChecker.exe 2352 215AppsChecker.exe 2352 215AppsChecker.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2128 dlhelpdl.exe 2128 dlhelpdl.exe 2128 dlhelpdl.exe 2128 dlhelpdl.exe 2128 dlhelpdl.exe 2128 dlhelpdl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 2300 335b01a38b8f5f557094dd9cfe1d748c.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2352 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 29 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28 PID 2300 wrote to memory of 2128 2300 335b01a38b8f5f557094dd9cfe1d748c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\335b01a38b8f5f557094dd9cfe1d748c.exe"C:\Users\Admin\AppData\Local\Temp\335b01a38b8f5f557094dd9cfe1d748c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\nsj74C4.tmp\dlhelpdl.exeC:\Users\Admin\AppData\Local\Temp\nsj74C4.tmp\dlhelpdl.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~4633~4639~~URL Parts Error~~SendRequest Error~5E-68-8C-03-EF-37~#~~SendRequest Error~~IE~~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\nsj74C4.tmp\215AppsChecker.exeC:\Users\Admin\AppData\Local\Temp\nsj74C4.tmp\215AppsChecker.exe /checkispublisherinstalled2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352
-