Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
5a175be814040e80ec2d49bba7f00867.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a175be814040e80ec2d49bba7f00867.exe
Resource
win10v2004-20231222-en
General
-
Target
5a175be814040e80ec2d49bba7f00867.exe
-
Size
250KB
-
MD5
5a175be814040e80ec2d49bba7f00867
-
SHA1
75542cf227194ef7811d4867f3753b4d182428c0
-
SHA256
16a9f22c7e1dd3fc561148608386bd923ab5062564a60588045f010deebd88e3
-
SHA512
3e3927ea516a7b4ea6ca2be68645d6eb2d99f5f47473fad2c35fedd3d710bdbb11d210b8daa8e8a8cafa42e15ebe8a4be342e29d3b9c40e2ccf57216214af0ff
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s5eL7QCrC/KA3Tw4tLOO8CUh3WX9K:h1OgLdaOs0Ce/KA3jwhm0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2976 50f33aa266d25.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 5a175be814040e80ec2d49bba7f00867.exe 2976 50f33aa266d25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2976-83-0x00000000750D0000-0x00000000750DA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00060000000161e2-30.dat nsis_installer_1 behavioral1/files/0x00060000000161e2-30.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15 PID 1708 wrote to memory of 2976 1708 5a175be814040e80ec2d49bba7f00867.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a175be814040e80ec2d49bba7f00867.exe"C:\Users\Admin\AppData\Local\Temp\5a175be814040e80ec2d49bba7f00867.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\7zSEC0.tmp\50f33aa266d25.exe.\50f33aa266d25.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976
-