Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15bd5288e37bc48ea18fa9bede3fb427.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
General
-
Target
15bd5288e37bc48ea18fa9bede3fb427.exe
-
Size
3.6MB
-
MD5
15bd5288e37bc48ea18fa9bede3fb427
-
SHA1
43398f5ef0f166b4a5a8af1e23d3f21ad19eeaa4
-
SHA256
d00bf132bc076c45a418176686e6201c6affdf4d46cefe87349f7918c82ea4a7
-
SHA512
ebb98a360f188e768ae35a1523c6921de6e1d68b2ddee0f366fd5cf635c167e0a3fc8ac82593d987b53a61e61b4088a704f75f0f922584a2a732a33281fc83bb
-
SSDEEP
98304:AEOaYoADdNkjF6o9y6f72mRvlhsYM/KPykHNh:AEOaYpJo9ff72nJyfth
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 15bd5288e37bc48ea18fa9bede3fb427.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4344 set thread context of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 set thread context of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\hackhound.txt 15bd5288e37bc48ea18fa9bede3fb427.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1652 3192 WerFault.exe 93 2096 3192 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3192 15bd5288e37bc48ea18fa9bede3fb427.exe 3192 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4344 15bd5288e37bc48ea18fa9bede3fb427.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3192 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 93 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 4344 wrote to memory of 3392 4344 15bd5288e37bc48ea18fa9bede3fb427.exe 96 PID 3192 wrote to memory of 1652 3192 15bd5288e37bc48ea18fa9bede3fb427.exe 99 PID 3192 wrote to memory of 1652 3192 15bd5288e37bc48ea18fa9bede3fb427.exe 99 PID 3192 wrote to memory of 1652 3192 15bd5288e37bc48ea18fa9bede3fb427.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe"C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exeC:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 5523⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 5523⤵
- Program crash
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exeC:\Users\Admin\AppData\Local\Temp\15bd5288e37bc48ea18fa9bede3fb427.exe2⤵PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3192 -ip 31921⤵PID:696