Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
71cc513b6bb6c3bd0c357b24ce455f5b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71cc513b6bb6c3bd0c357b24ce455f5b.exe
Resource
win10v2004-20231215-en
General
-
Target
71cc513b6bb6c3bd0c357b24ce455f5b.exe
-
Size
176KB
-
MD5
71cc513b6bb6c3bd0c357b24ce455f5b
-
SHA1
f3f4a4296ae79cf7f543fe6e3c433a337c976fbb
-
SHA256
e56ea7c2e82bb17bc8347f3231ae4034f1ac94e416507e0bd5320d084ea167bc
-
SHA512
d9010130dafe3bb6052158b89482e93c729df0e453eb4c131f3ca09c3089696cf155dd427e6fdc6bc1e0378818b8f825bdf17ea6a15a66a0b5475619a1a3b0d9
-
SSDEEP
3072:Oro+Z8eSOPwiDtVFz1oGMZGJfUYo1fAntahCGKOj6xf:OcurLXXgyVU0ahd
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2548-1-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/3044-5-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/816-79-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2548-81-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2548-181-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2548-184-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3044 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 28 PID 2548 wrote to memory of 3044 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 28 PID 2548 wrote to memory of 3044 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 28 PID 2548 wrote to memory of 3044 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 28 PID 2548 wrote to memory of 816 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 30 PID 2548 wrote to memory of 816 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 30 PID 2548 wrote to memory of 816 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 30 PID 2548 wrote to memory of 816 2548 71cc513b6bb6c3bd0c357b24ce455f5b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exe"C:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exeC:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exeC:\Users\Admin\AppData\Local\Temp\71cc513b6bb6c3bd0c357b24ce455f5b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD58f35286123b8d0c5b0220be20a7702be
SHA19b8e23b93a8e6e9376a87f6f1a890e4240f4dde9
SHA25617f6adcd0a3e8979e5ee9af2937fce7358ac33eaad428e02698ade525d488be8
SHA512d9ee1fab8c262bf948d514f03b2678e29c23c1d50dac09a30753b9d1d8985a15932e861ad9c510f0bbd7ed1f73fbcc3501a51c7c746498f344e6d1f5cc35521a
-
Filesize
996B
MD57682331c12868451d4d201f077622dca
SHA156fb882f88cfbdad94f8451205693dfc2bd85b28
SHA25636fcef80b1cbee88bffeb7eb16fd28d4d6724a182a41aa9ecc261a0fba462e74
SHA5122b7c764a92fe05e6930fe2f98f48f7045de36c0df6efa9da6eb7aa0ce82641944fdd164abe16e67a1811d2b8bc89dc7cbb450c3991aa37dc6650a6f113cd993e