Analysis
-
max time kernel
141s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
096445a1c3e9b93e3264432a58b081ee.exe
Resource
win7-20231215-en
General
-
Target
096445a1c3e9b93e3264432a58b081ee.exe
-
Size
200KB
-
MD5
096445a1c3e9b93e3264432a58b081ee
-
SHA1
33e405bf88a373a0439f567d0290221ccf9f707b
-
SHA256
e0b8a0dfeade8b222a573b523ae3844aee7eef573b7a25af5f2b115cea1eb04d
-
SHA512
bfde35a00b8d42498e098f6fe72e8276f9be76766443230429e50a66bb5e3f8fe77cbb859423a708629acf7021a2d881425cc2f520b55f7a2f28dacad36a5bb7
-
SSDEEP
6144:mEh6VmRFOxVWZW9WnthJjXXLZ4pHv05Ik8ysfd:76VmRgantjjnOhvJPF
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4388 1736 096445a1c3e9b93e3264432a58b081ee.exe 92 PID 1736 wrote to memory of 4388 1736 096445a1c3e9b93e3264432a58b081ee.exe 92 PID 1736 wrote to memory of 4388 1736 096445a1c3e9b93e3264432a58b081ee.exe 92 PID 4388 wrote to memory of 440 4388 cmd.exe 94 PID 4388 wrote to memory of 440 4388 cmd.exe 94 PID 4388 wrote to memory of 440 4388 cmd.exe 94 PID 4388 wrote to memory of 3160 4388 cmd.exe 95 PID 4388 wrote to memory of 3160 4388 cmd.exe 95 PID 4388 wrote to memory of 3160 4388 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 440 attrib.exe 3160 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\096445a1c3e9b93e3264432a58b081ee.exe"C:\Users\Admin\AppData\Local\Temp\096445a1c3e9b93e3264432a58b081ee.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MICROS~1\TEMPLA~1\2E9TMP~1.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\096445a1c3e9b93e3264432a58b081ee.exe"3⤵
- Views/modifies file attributes
PID:440
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Microsoft\Templates\2E9.tmp.bat"3⤵
- Views/modifies file attributes
PID:3160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442B
MD5c8a5c89cb9da76ec5c68c690d60f2130
SHA149a89a04b60b534d0b15922a1c42acbbdb83ce3b
SHA2569d6f0bd97077138cc571b0dd9b7b142cb7858a9f9b03bd04fd61f4ec3f2f2dc2
SHA51206b4d33f677c368ed80616deec35f88631a321dbf76bfbbb5d3e0dca618090a29fb74a96db14d9d12fd8647122e55b80f43ef491c66da0e29ba79c786c973140