Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
00562574e4499d573ec029b85257ba23.exe
Resource
win7-20231129-en
General
-
Target
00562574e4499d573ec029b85257ba23.exe
-
Size
247KB
-
MD5
00562574e4499d573ec029b85257ba23
-
SHA1
d4b6b863f39b537dc71b2a429e200d4abe832135
-
SHA256
08d5b02508cc4c59ec6b8c8c4dc393c426f370e913c85308cb36796c9cde87ba
-
SHA512
73f2326ee52533a6122d2cac401f9390e729265bea7bb763b7f8709acaa1a3b5a0d60e7045d5b8fe3806222b77133269085cbd9e67bb586c4d08ba92a727cc8d
-
SSDEEP
3072:EQIURTXJ/adlU8GCNODYQr1mqWdMmCk1vjPbF4E7aVyGlnzGBhC5AYkNmdUL8hrp:Es87FGqQZK94E7a08nafC4je5OYXj
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe 4332 00562574e4499d573ec029b85257ba23.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
16KB
MD5f642e8cfce23aa5d124533357de7394b
SHA180ce98a2bc4b416db357ea52a74424d742cfaa55
SHA256f1bed304ea1d96094c1e4e3f8e112b7ce15af4441192e73c9144f774ad132d2e
SHA512d0ec47e3a69cc6c6f54e8ba58cade7875ace43b66946e7bd4b678dc246c61acf8d36aeaf80082308f08783c28424c5db601bdde1d820f7797b60ca4fe948ad26
-
Filesize
17KB
MD57d3317f57c1a368480ace3c0ca804eeb
SHA1d4c7e185bc64aac82339f51ba6c21cf0713c9f1a
SHA256d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372
SHA5125598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e