Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 06:20

General

  • Target

    5933d0bc1fc44a2a62b8e574489268be.exe

  • Size

    50KB

  • MD5

    5933d0bc1fc44a2a62b8e574489268be

  • SHA1

    68a1d00ca857499328c257ac7adcb48f6843dd0b

  • SHA256

    e84a6c7391d7c1e43e3fa0c20ff1bb457a7efc99a58aed5d269bb6cb82fe9883

  • SHA512

    15a0621357b9d4e3287241d27eec8dbb797e2a9fc04f0d722eefb4f252ba0f0c2fa10ea77db73b785de82f9c10f76cd02d60ae1ffbddec6c99656679dff57cf6

  • SSDEEP

    768:Cnc/j++SQ6+r3kMkodtDDvk7BG1qMYmW+ghih7MwOOqI+yDYun0:uSj++z3Sodt8FGM+JvOjIJDNn0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5933d0bc1fc44a2a62b8e574489268be.exe
    "C:\Users\Admin\AppData\Local\Temp\5933d0bc1fc44a2a62b8e574489268be.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\file1.exe
      file1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\file1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5
          4⤵
          • Delays execution with timeout.exe
          PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\file1.exe

    Filesize

    18KB

    MD5

    4e1da246067426b3bdae15a9e5426040

    SHA1

    d5eafadc6da6fc6916c2cc830776b41d23f9970b

    SHA256

    4c9460525277eb36122103e8b646efd89febba0ce48a2f6335085f1d5438a66b

    SHA512

    d703d32c7fa3d54ac0177f58d735be52a4de4be62599794e79c15fb8eef1126a80b00f9d5e159ae0a41ea3c84e49960c4d7bf47da5a21e0ca81ac2f42bf50f94

  • memory/2040-0-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2040-1-0x0000000000A10000-0x0000000000A90000-memory.dmp

    Filesize

    512KB

  • memory/2040-2-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2040-3-0x0000000000A10000-0x0000000000A90000-memory.dmp

    Filesize

    512KB

  • memory/2040-13-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB