Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:23
Static task
static1
Behavioral task
behavioral1
Sample
09f801b31b0d3ecbdf67113059f8a744.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09f801b31b0d3ecbdf67113059f8a744.exe
Resource
win10v2004-20231215-en
General
-
Target
09f801b31b0d3ecbdf67113059f8a744.exe
-
Size
864KB
-
MD5
09f801b31b0d3ecbdf67113059f8a744
-
SHA1
a2d48c626a148314ad5f41f71b7b3c3102525e31
-
SHA256
38dcae9d8e9155cbbafab1804b3daa48b7b381afb41e920a695ba922594dc459
-
SHA512
d1ef52af54d3f3451170a6dc9fd647369a804f0c25b8e37dfdffecd43b3e847087705cada3a8921e22b4061ffe16f24cfa918b6de68ffeee3485e249fd8ff3cc
-
SSDEEP
12288:T51+RkZ2TDVADK/nj+qmTIw65lX4JvJ+gTuCX2Cn7aZqoLl+nwvAU+egNaEP9:TqRkoB/nj+qmMwf/VX3GZqoLl+JJeNy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Loads dropped DLL 3 IoCs
pid Process 2200 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Antivirus2008y = "C:\\Program Files (x86)\\Antivirus2008y\\09f801b31b0d3ecbdf67113059f8a744.exe" 09f801b31b0d3ecbdf67113059f8a744.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Antivirus2008y\09f801b31b0d3ecbdf67113059f8a744.exe 09f801b31b0d3ecbdf67113059f8a744.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 09f801b31b0d3ecbdf67113059f8a744.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2700 2200 09f801b31b0d3ecbdf67113059f8a744.exe 28 PID 2200 wrote to memory of 2700 2200 09f801b31b0d3ecbdf67113059f8a744.exe 28 PID 2200 wrote to memory of 2700 2200 09f801b31b0d3ecbdf67113059f8a744.exe 28 PID 2200 wrote to memory of 2700 2200 09f801b31b0d3ecbdf67113059f8a744.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f801b31b0d3ecbdf67113059f8a744.exe"C:\Users\Admin\AppData\Local\Temp\09f801b31b0d3ecbdf67113059f8a744.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Antivirus2008y\09f801b31b0d3ecbdf67113059f8a744.exe"C:\Program Files (x86)\Antivirus2008y\09f801b31b0d3ecbdf67113059f8a744.exe" /d:C:\Users\Admin\AppData\Local\Temp\09f801b31b0d3ecbdf67113059f8a744.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864KB
MD509f801b31b0d3ecbdf67113059f8a744
SHA1a2d48c626a148314ad5f41f71b7b3c3102525e31
SHA25638dcae9d8e9155cbbafab1804b3daa48b7b381afb41e920a695ba922594dc459
SHA512d1ef52af54d3f3451170a6dc9fd647369a804f0c25b8e37dfdffecd43b3e847087705cada3a8921e22b4061ffe16f24cfa918b6de68ffeee3485e249fd8ff3cc