Analysis
-
max time kernel
139s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f837d82a08474f44c6d1a708d6deaba.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
1f837d82a08474f44c6d1a708d6deaba.exe
-
Size
307KB
-
MD5
1f837d82a08474f44c6d1a708d6deaba
-
SHA1
23a2ebd9d256656157fd56b74bd9a0febb537c6c
-
SHA256
35891aabdf81869022a7600f0a61da458340665eeb09fe09b07dad6d59f7273e
-
SHA512
d80d3ef0f22971e7556832886e84345eed8ee311f08ca79cab9fb2d806d038c1f032335a615932d20ea647dac92cdf9a026cf34606a709b4926bafdb262e89e5
-
SSDEEP
6144:wIfSXVDpYRCdOAbPT8shy1k4LjzKApj9u:HfSFD2RCdOET7hyq4LjzBj9
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings 1f837d82a08474f44c6d1a708d6deaba.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3308 4796 1f837d82a08474f44c6d1a708d6deaba.exe 89 PID 4796 wrote to memory of 3308 4796 1f837d82a08474f44c6d1a708d6deaba.exe 89 PID 4796 wrote to memory of 3308 4796 1f837d82a08474f44c6d1a708d6deaba.exe 89 PID 3308 wrote to memory of 532 3308 net.exe 91 PID 3308 wrote to memory of 532 3308 net.exe 91 PID 3308 wrote to memory of 532 3308 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f837d82a08474f44c6d1a708d6deaba.exe"C:\Users\Admin\AppData\Local\Temp\1f837d82a08474f44c6d1a708d6deaba.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:532
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2508