Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
1c7e3910a7eae063e8d6edd390c0e059.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c7e3910a7eae063e8d6edd390c0e059.exe
Resource
win10v2004-20231215-en
General
-
Target
1c7e3910a7eae063e8d6edd390c0e059.exe
-
Size
184KB
-
MD5
1c7e3910a7eae063e8d6edd390c0e059
-
SHA1
3fe6a0e91bf336d4b6f7216f978b776d4c47bcc0
-
SHA256
e68885ec20f50bdfe26b2d29b576cc14c42f3d275ff6b7745ebac135f31f5793
-
SHA512
7c3212f80f05eb2e9cdc42cb497ce35814eea83168d4409c41e56f039335db80a9eac924094158eeb85b9a6a0c476eb3c7196b8d939ea163a66897e9acbdf558
-
SSDEEP
3072:Eb8GZwHMnOJsrDLsvsWqmno1PHA1qu7fqyB6PID/p5UkgvmODt:EbTKsng8XsDo1PHAgu7fKQp53gvv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 1c7e3910a7eae063e8d6edd390c0e059.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2760-12-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2948-2-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2948-74-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2976-73-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2948-187-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2760 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 19 PID 2948 wrote to memory of 2760 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 19 PID 2948 wrote to memory of 2760 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 19 PID 2948 wrote to memory of 2760 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 19 PID 2948 wrote to memory of 2976 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 30 PID 2948 wrote to memory of 2976 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 30 PID 2948 wrote to memory of 2976 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 30 PID 2948 wrote to memory of 2976 2948 1c7e3910a7eae063e8d6edd390c0e059.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exe"C:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exeC:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exeC:\Users\Admin\AppData\Local\Temp\1c7e3910a7eae063e8d6edd390c0e059.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2976
-