Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
0c749ad588b98fb31ad7582308d09d53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c749ad588b98fb31ad7582308d09d53.exe
Resource
win10v2004-20231215-en
General
-
Target
0c749ad588b98fb31ad7582308d09d53.exe
-
Size
168KB
-
MD5
0c749ad588b98fb31ad7582308d09d53
-
SHA1
2a5b6c0e47b4ee8a2f02c3b759f991a1806fb827
-
SHA256
44859cfca4b57e180e4ba3959cda0063cfaa22b3baee5fa4201a6be69d1d5e1f
-
SHA512
d52ef7bc08887e66f27caf8f92f6387d2bcf2130be5987b40028d8fce6cfa5fcffca3b7e3a2f0990cdcc0ffdd7ce98193545140391eee145f14b1270abd541bc
-
SSDEEP
3072:kfn0ATE98VbOROy3M0cc+qJoxvPVHiTcw6406cBdkTjF5uO/X05s:k8Ao98MIy3M0cc+qmxvNHiTcw67dkO8+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\DFEC7\\1864C.exe" 0c749ad588b98fb31ad7582308d09d53.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1464-1-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/4052-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1464-42-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/112-112-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1464-113-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral2/memory/1464-181-0x0000000000400000-0x0000000000490000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4052 1464 0c749ad588b98fb31ad7582308d09d53.exe 40 PID 1464 wrote to memory of 4052 1464 0c749ad588b98fb31ad7582308d09d53.exe 40 PID 1464 wrote to memory of 4052 1464 0c749ad588b98fb31ad7582308d09d53.exe 40 PID 1464 wrote to memory of 112 1464 0c749ad588b98fb31ad7582308d09d53.exe 98 PID 1464 wrote to memory of 112 1464 0c749ad588b98fb31ad7582308d09d53.exe 98 PID 1464 wrote to memory of 112 1464 0c749ad588b98fb31ad7582308d09d53.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exe"C:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exeC:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exe startC:\Program Files (x86)\LP\4CBD\FAF.exe%C:\Program Files (x86)\LP\4CBD2⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exeC:\Users\Admin\AppData\Local\Temp\0c749ad588b98fb31ad7582308d09d53.exe startC:\Program Files (x86)\C760F\lvvm.exe%C:\Program Files (x86)\C760F2⤵PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a5adbe2ba671d32d17dbf894804493c6
SHA1192262b9f92ad10b6c082e9a3c3b0c734c19add8
SHA2566a2db78367b62274a66cb1ab9587964e00a5e03bdb12840d48ef5c39e0259bee
SHA51205c5cace75a466bae167d5ede236836e91de1ba14b70bff81e5be19adea3118474aedb188f33d6fae6042cf06a2c6de9a9cadf49bde7e684a8f086664714d26f
-
Filesize
600B
MD5b0e3008a1e5bb3108e9ad53634220cee
SHA1cb9c5be9cef840ad53fc8c8e21978434d39da663
SHA256d0fcdf7125a0780592ca9dacb4a119f7dc12ba626bc6f2a3cb1bffac8d2740a9
SHA5128eb9741dbffa5aeb1b715f8d0fba34240ebf50a9be8f8b3ebd8cef2310b9fbd95a0ca1742e3c75e9edb378128b15741a83bb8104bcf00a4e06e9e9ba861ee7de
-
Filesize
1KB
MD588e6f2c0b870b603041d63619f042f63
SHA13cca82802859c03959eb2833f903b9dff8645909
SHA256e803bb13e0e660ffc4eb75cbb1e7c9567f8d46b45fc6add8872ecb4c7f26eeb5
SHA5124102ce370221830e3667585a65cba88c4d081b19107df2e6829a362d3dc5252719dedb201197575aaafc06cfb83b025334232b590e01a0f040f124480a70f7b9