Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15bd5288e37bc48ea18fa9bede3fb427.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
General
-
Target
15bd5288e37bc48ea18fa9bede3fb427.exe
-
Size
3.6MB
-
MD5
15bd5288e37bc48ea18fa9bede3fb427
-
SHA1
43398f5ef0f166b4a5a8af1e23d3f21ad19eeaa4
-
SHA256
d00bf132bc076c45a418176686e6201c6affdf4d46cefe87349f7918c82ea4a7
-
SHA512
ebb98a360f188e768ae35a1523c6921de6e1d68b2ddee0f366fd5cf635c167e0a3fc8ac82593d987b53a61e61b4088a704f75f0f922584a2a732a33281fc83bb
-
SSDEEP
98304:AEOaYoADdNkjF6o9y6f72mRvlhsYM/KPykHNh:AEOaYpJo9ff72nJyfth
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 15bd5288e37bc48ea18fa9bede3fb427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1200 set thread context of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 set thread context of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\hackhound.txt 15bd5288e37bc48ea18fa9bede3fb427.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 2420 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2420 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 1200 wrote to memory of 2420 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 28 PID 2420 wrote to memory of 2732 2420 15bd5288e37bc48ea18fa9bede3fb427.exe 29 PID 2420 wrote to memory of 2732 2420 15bd5288e37bc48ea18fa9bede3fb427.exe 29 PID 2420 wrote to memory of 2732 2420 15bd5288e37bc48ea18fa9bede3fb427.exe 29 PID 2420 wrote to memory of 2732 2420 15bd5288e37bc48ea18fa9bede3fb427.exe 29 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30 PID 1200 wrote to memory of 2868 1200 15bd5288e37bc48ea18fa9bede3fb427.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe"C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exeC:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 1963⤵
- Program crash
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exeC:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe2⤵PID:2868
-