Analysis
-
max time kernel
133s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
028492fc335c13faa874be9006a897aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
028492fc335c13faa874be9006a897aa.exe
Resource
win10v2004-20231215-en
General
-
Target
028492fc335c13faa874be9006a897aa.exe
-
Size
216KB
-
MD5
028492fc335c13faa874be9006a897aa
-
SHA1
a6943ad381439c628c156fa1b14dd6bb3679d42e
-
SHA256
7d5bdd7e7bf808c6e0f70796a19afd4a7b25ce943cc724d6ad3efd0db7738908
-
SHA512
13d3c3161bbd6c32aa2f661584fddb4d23e3ee493225d07351d36e0aa663463acd775081b69cb0bff4ca0bfbfb130bea944ed3e3b02d050ddb2a9bf9dbd100aa
-
SSDEEP
3072:uGNu08lhIDSwT+An/KPi7LLZDJhYjdp8/1/W6rr1:uGU0xDvboCLdDJhAr8N/Dr1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 820 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{B7C4995B-7F2C-C603-08DB-4D3692C2A6F9} = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\s5jf5e5i.default-release\\security_state\\sfc.exe" 028492fc335c13faa874be9006a897aa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3208 820 WerFault.exe 104 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 028492fc335c13faa874be9006a897aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 028492fc335c13faa874be9006a897aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 028492fc335c13faa874be9006a897aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" svchost.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe 1112 028492fc335c13faa874be9006a897aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 820 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104 PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104 PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104 PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104 PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104 PID 1112 wrote to memory of 820 1112 028492fc335c13faa874be9006a897aa.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\028492fc335c13faa874be9006a897aa.exe"C:\Users\Admin\AppData\Local\Temp\028492fc335c13faa874be9006a897aa.exe"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵
- Deletes itself
- Checks processor information in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
PID:820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 20163⤵
- Program crash
PID:3208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 820 -ip 8201⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\s5jf5e5i.default-release\security_state\sfc.exe
Filesize124KB
MD5d2fe8e2ed088ba06f51ca280428adad8
SHA1eb50063af154699901ad1b3c36eb3df16113bddc
SHA25670a7abea40f4be867ff4160979418b787309fc339b9ade36f1396e24b8cff163
SHA5129552eec270197b1cb1218d3243f0769190caae6e2d6f8a03d9c6442e5a574edcb987b4d13b53822e20b6191043d9b6e6e90bc051149f8f7dadecf63fc7422224