Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:48
Behavioral task
behavioral1
Sample
03995bc9ee5e40479917fa8a30b7885a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03995bc9ee5e40479917fa8a30b7885a.exe
Resource
win10v2004-20231215-en
General
-
Target
03995bc9ee5e40479917fa8a30b7885a.exe
-
Size
556KB
-
MD5
03995bc9ee5e40479917fa8a30b7885a
-
SHA1
5c6b560b2d91e1801e8141ca384af14e574edfda
-
SHA256
57abbc568ff5d0b808b48131ce6f7bead0cd3fae08e13bc91e63e5b7ebea8290
-
SHA512
0d9a503fd030bbeee9cfaf3a6bbbe845fe5f6efa3917d13283106c58d7c5acf19871e1069d6a1b5435368b18e178cd9cdd0de622d294bae47de69bce412eccdc
-
SSDEEP
12288:yGMVWEswD7o/Aoy51aISoO+YlyeU81GYOCmBmXHKwMMzk:yGSWEhnoIooSUY40G4imXHKwMMzk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2348 03995bc9ee5e40479917fa8a30b7885a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2348-1-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-2-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-0-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-161-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-162-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-163-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-166-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-167-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-168-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-170-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral1/memory/2348-171-0x0000000000400000-0x0000000000521000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259398618.log 03995bc9ee5e40479917fa8a30b7885a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1936 2348 WerFault.exe 14 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 03995bc9ee5e40479917fa8a30b7885a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 03995bc9ee5e40479917fa8a30b7885a.exe 2348 03995bc9ee5e40479917fa8a30b7885a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1936 2348 03995bc9ee5e40479917fa8a30b7885a.exe 32 PID 2348 wrote to memory of 1936 2348 03995bc9ee5e40479917fa8a30b7885a.exe 32 PID 2348 wrote to memory of 1936 2348 03995bc9ee5e40479917fa8a30b7885a.exe 32 PID 2348 wrote to memory of 1936 2348 03995bc9ee5e40479917fa8a30b7885a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\03995bc9ee5e40479917fa8a30b7885a.exe"C:\Users\Admin\AppData\Local\Temp\03995bc9ee5e40479917fa8a30b7885a.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 17122⤵
- Program crash
PID:1936
-