Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
1d2b78ba2d495e6e565a05f09c1cf75e.exe
Resource
win7-20231129-en
General
-
Target
1d2b78ba2d495e6e565a05f09c1cf75e.exe
-
Size
464KB
-
MD5
1d2b78ba2d495e6e565a05f09c1cf75e
-
SHA1
0f93835943ff460902e4036e22b2fe7251805f98
-
SHA256
0807e09831359ec7493d64589372ce3bcd3aeb314360fac70a9aee1f7a5ca52e
-
SHA512
8f56c237cefed2481942a2e49dc2b0f69e8a9586c82aa9939facf11475787aff54386fa23fb044e54c5b9942c49c0fe71792e07f7b12b1eb4e9869648acc2768
-
SSDEEP
12288:yqHHXQZQtxteAHUN1g38pNvyLyBg2JsRgFKHyK2q5:yqAgLVQVvKgSHyK2q5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 InitInstall.exe -
Loads dropped DLL 19 IoCs
pid Process 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 2840 InitInstall.exe 2840 InitInstall.exe 2840 InitInstall.exe 2840 InitInstall.exe 2840 InitInstall.exe 2840 InitInstall.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD 1d2b78ba2d495e6e565a05f09c1cf75e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28 PID 2928 wrote to memory of 2840 2928 1d2b78ba2d495e6e565a05f09c1cf75e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2b78ba2d495e6e565a05f09c1cf75e.exe"C:\Users\Admin\AppData\Local\Temp\1d2b78ba2d495e6e565a05f09c1cf75e.exe"1⤵
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\nsi12F5.tmp\InitInstall.exeC:\Users\Admin\AppData\Local\Temp\nsi12F5.tmp\InitInstall.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~ 551~1799~~URL Parts Error~~SendRequest Error~F6-2A-48-C4-CC-A6~#~~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e