Analysis
-
max time kernel
203s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:22
Behavioral task
behavioral1
Sample
00531b5eb9229b66b784bc3f12e20527.exe
Resource
win7-20231215-en
General
-
Target
00531b5eb9229b66b784bc3f12e20527.exe
-
Size
547KB
-
MD5
00531b5eb9229b66b784bc3f12e20527
-
SHA1
858a61c70a55b761d88696fce1aabe654bb17ef3
-
SHA256
3b176d7d7a88ab7cc852d8e00bb11ed1053072d70d57457f4199738a90dfdaa0
-
SHA512
9bc55138c5d472ed8773564c8af0d3cf81aff24ac17790e0bd93dd712361c13019f1c21deb836a1ab0eb9efa69fc3434094358016460756e5deb0839e9f1968e
-
SSDEEP
12288:rlwocB7mDg+aGLkS2rTcWrosVOCl8+zc5knwc18W1LM2TWmlr:+xB7m8+92NMHYPn5mW1LhTWm
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1076-0-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-1-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-2-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-68-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-69-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-79-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-81-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/3656-83-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/3656-88-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/3656-98-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-144-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-145-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-146-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-147-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-149-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-150-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-151-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-152-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-153-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral2/memory/1076-154-0x0000000000400000-0x0000000000513000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240723531.log 00531b5eb9229b66b784bc3f12e20527.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1076 00531b5eb9229b66b784bc3f12e20527.exe 1076 00531b5eb9229b66b784bc3f12e20527.exe 1076 00531b5eb9229b66b784bc3f12e20527.exe 1076 00531b5eb9229b66b784bc3f12e20527.exe 3656 00531b5eb9229b66b784bc3f12e20527.exe 3656 00531b5eb9229b66b784bc3f12e20527.exe 3656 00531b5eb9229b66b784bc3f12e20527.exe 3656 00531b5eb9229b66b784bc3f12e20527.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1076 00531b5eb9229b66b784bc3f12e20527.exe 1076 00531b5eb9229b66b784bc3f12e20527.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3656 1076 00531b5eb9229b66b784bc3f12e20527.exe 92 PID 1076 wrote to memory of 3656 1076 00531b5eb9229b66b784bc3f12e20527.exe 92 PID 1076 wrote to memory of 3656 1076 00531b5eb9229b66b784bc3f12e20527.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00531b5eb9229b66b784bc3f12e20527.exe"C:\Users\Admin\AppData\Local\Temp\00531b5eb9229b66b784bc3f12e20527.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\00531b5eb9229b66b784bc3f12e20527.exe"C:\Users\Admin\AppData\Local\Temp\00531b5eb9229b66b784bc3f12e20527.exe" /_ShowProgress2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
1KB
MD5a84fee16240de0d25f1b3ec8df25a11c
SHA1ff395834bb8ff730b31c1daefc8ff197ce280ad0
SHA2561f0d38fefdd7a232dfaa16a68e7a95758329c0ed3e6b0adc324ba1fbf1c31107
SHA51236b27fba9474d6bad64e7b91dae457e156367ccf3eb5eeddbf51fafca009625539c2ea1f894686bba61658f29208bbd381387312a02e7216d166bdc28201497f
-
Filesize
4KB
MD5aff1b740c3a48c23e529e439a46f445a
SHA1df7a706d577e51bd54d115620ca5497eb77edc2e
SHA256212270d2b0b1e1e49f74b97ce75110e5eee1fca8a2216ad4f3c655674e6eeede
SHA512c1cf10c6609697fe98e049e5ed7abc3104dfad724db241f03dc36cb649dd735f8d26b0051af722a3ad72da48413ac38f2d0e66f53a4c314d4b3acc08d836635e
-
Filesize
318B
MD510c359bc980927bb66b215407ece3e66
SHA14a2fc034bf7b4e84d832b6bbd9413d2055b9ec62
SHA2565b12769a75d1c755a284a73e1b8422f73d6223c23b72e5bce698c17f50185aa8
SHA512ed707c6bbf5023aa147571d9d186e8348b11da6fb462de69e4135480f2e10081c416c80745411752797401660221e2040e624b5a6d3e1a57ba59cdcc009eb16c
-
Filesize
417B
MD537e1ff96e084ec201f0d95feef4d5e94
SHA14ec405f2668d5d93260525ad916abafa2414cb72
SHA2568e806f5b94fc294e918503c8053ef1284e4f4b1e02c7da4f4635e33ec33e0534
SHA5121a8a27a92abe35edaa2c950b130579c92f0d0d87b09971843c39569cf06d407b8e896751e73452676bfad45a363f0b6dd00cb6c5faf33966880539e106b19f94
-
Filesize
190B
MD564773c6b0e3413c81aebc46cce8c9318
SHA150f84ef8331341b48981af82313b146863eba526
SHA256b09504c1bf0486d3ec46500592b178a3a6c39284672af8815c3687cc3d29560d
SHA51203e96bef74c0b3a31124c3d3c1bb78af1053a8719ca373c6b9316d63bac9545c1f4ecc2d747eb64341d8da31bc0f23da094e19c3e07ed46f65c28dc88e13bd3a
-
Filesize
632B
MD58f6a2e09ace79158461b82d74ff6c7fd
SHA188f079fd001feb2cb302565b87fdb81c8995dd93
SHA256b4bee76334ab9b4b0bdd2bff1b3f3a7b30d2e758bb8d4c6e457c9594bb62960c
SHA512869305ea12f21564e56882fef318cdc21f88715f894e8140ae6b2cf3137a4c2002a34f2f8ae2719f770e2d0c892244b5e5f3229f1382e799dd309f52657cb98e
-
Filesize
20KB
MD594d82a50272a4423dca66ae32e0602ca
SHA118a1300c684442bffb41dcba54d30c72888f48ec
SHA25603903399fb31a966050a305d95f585b4d95118eccd9e05a866ac9cdfc7dcbe9f
SHA51265ccc863b46fedfe5d1e4089cf4bc93a6248f0263266639bde133b416f58e9eb8765a7b15088173470cde1db68ec536bdf65563eba82020d363cb7b2cae18f33
-
Filesize
266B
MD50e0aead9873f985325c78c564830b2da
SHA1339d70c35d53f322908be28dd80002379b739921
SHA256bf07069ae477cdfbcbf2541c15f1c8b0cca5158d288ea3c0f86485bd45cefd98
SHA51296d6f1edeaf4b7e76fb76fda7e14fe9dca86f21f3a1281d5445603a8b52f5201013a82541c1d1887c1cb36de7cb61c1a3a5cc93f1deeaec4c680c3eabff6008c
-
Filesize
1KB
MD583487401daf307d6c726a479de1ee6f9
SHA1c173be4937a63672570078b325864c76b28040b8
SHA256f4f0f59fccd9b87b208b416423797dcfb532472dcfef99bef41a11ea9f6f713b
SHA512da69729b6682acd1c46587c7c3b4533d9afbcf84c17e55f43798f1fee0097c7a2f39860e6dbc6a9b1cb26dc63d9afab4511071981ad5fd494f36ad9659c56e50
-
Filesize
2KB
MD5e37ec66b72996fc3ad929cd068570d4d
SHA1e21be5ea412b4dc02b7d3a61ab3a798946224cae
SHA256bb4c9ad7ce53b3f958f800f9f04200c0f70542a60e97bba8bdffe7d32dfe9ad4
SHA512f0973de78b2299fa4116ebefb6944b0a02ff8b8e568eb8e1967b7939a041b31c09e166fc3a33b1ed74c143236b5e0faa7c3905db831b9c262e0de0af9211b9e6
-
Filesize
3KB
MD5b460d82eab7af8ba6e338e351dd0ecdc
SHA1265b9a3f3c80f40f8534ddcfbf9c1ed61e3b1b20
SHA25647a4ac193b9bdfe15d0b8a95370823739c2ae4f6ebf2015e1412b880cde6b81d
SHA512e3add5d91a61da7f64c7860e6303344f37cd49e2fde15c677924d133fec607dfe4ab4d99ec8a3322587b0b186a58e71fcd326e67057a6ff7ef80ad8ed3f0e63e
-
Filesize
2KB
MD5274548cb843bb96fcb50a79a2340b22d
SHA1bb5253c868861ff10fd48dcce1309d847f087e80
SHA256d4c02b2a0debcdd1689bcfbc7987826deeb6ec10806d5dd6500def9cd901735d
SHA512a0117381f58b6b741b049dbb5eadb5917c4199002a73c62890c30cf5759bdf09e8a163e413dc8459dc0dbe0c2cef35d5d5d4653c3646a7214495ae51a4c0d538
-
Filesize
176B
MD5192b249d9413082d676f85d1509fe258
SHA14130ba10d3bb2267f19fa07dc0672e6ba23a8c4e
SHA256b97788b954e0f774c72a3a5bf9e50031e0bffbd8185d05fe443a8f47cafc0660
SHA51275955b892ae19c31b3180d58adc103292fc5dc764b9932b145464021aad347cfdcc5524b24712feb4f611aaa9f375a0088a194a072cf846f1fe625236ac1b82d