Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 02:24
Static task
static1
Behavioral task
behavioral1
Sample
4c8ea25efa21e0b4b99b264212ae6a72.exe
Resource
win7-20231215-en
General
-
Target
4c8ea25efa21e0b4b99b264212ae6a72.exe
-
Size
996KB
-
MD5
4c8ea25efa21e0b4b99b264212ae6a72
-
SHA1
39294e59f133d7d5faa293a7a8fb2b29ef38504c
-
SHA256
54e07952d633182d47ef771ebee5d01814da8673290feb45ac827cf38fd1dddc
-
SHA512
bcc8f032f4ceab33bd07bd2c12c80814b442e172c3089f5da34ef9ee47e9861acd10f13c8a1ff84f11d9173cffdeeb483746998d2ceab390c2a05bfe57e5727c
-
SSDEEP
24576:/85sjkZczo63M87oYbJd5A8uvKovKSHPf4xVv59:/2sloTYBbSDvKovKSvgxVvT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1996 215AppsChecker.exe 2260 dlhelpdl.exe -
Loads dropped DLL 46 IoCs
pid Process 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 1996 215AppsChecker.exe 1996 215AppsChecker.exe 1996 215AppsChecker.exe 1996 215AppsChecker.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2260 dlhelpdl.exe 2260 dlhelpdl.exe 2260 dlhelpdl.exe 2260 dlhelpdl.exe 2260 dlhelpdl.exe 2260 dlhelpdl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 1996 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 29 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28 PID 2108 wrote to memory of 2260 2108 4c8ea25efa21e0b4b99b264212ae6a72.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c8ea25efa21e0b4b99b264212ae6a72.exe"C:\Users\Admin\AppData\Local\Temp\4c8ea25efa21e0b4b99b264212ae6a72.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\dlhelpdl.exeC:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\dlhelpdl.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~6477~5050~~URL Parts Error~~SendRequest Error~E6-62-9D-F8-54-3F~#~~SendRequest Error~~IE~~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\215AppsChecker.exeC:\Users\Admin\AppData\Local\Temp\nsi1601.tmp\215AppsChecker.exe /checkispublisherinstalled2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e