Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
21ffd565d0b8ace569a8e202d8cea228.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21ffd565d0b8ace569a8e202d8cea228.exe
Resource
win10v2004-20231215-en
General
-
Target
21ffd565d0b8ace569a8e202d8cea228.exe
-
Size
373KB
-
MD5
21ffd565d0b8ace569a8e202d8cea228
-
SHA1
479c6f98c5d813ceca23e16cf468c547a039fb7e
-
SHA256
f71f0b4ae3c220ae543931d39165f79da9d9a4de0b74c2890d05a7b8c62e258a
-
SHA512
832efdf964eab08dbf863803e37d40e8c2b6e095bb31b29a65d52aa6d530f8d040b2b02a4eac64392d8a1d745f4be57fec181fd3f1e4113731b038aabe8d2c4f
-
SSDEEP
6144:9vvu41TrJNFWyDVa6c83u8p3soPJkHUvhgSNDc1SQ3Tx:93TR5p3LpDPSchvDc1djx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1840 Update.exe -
Loads dropped DLL 4 IoCs
pid Process 2356 21ffd565d0b8ace569a8e202d8cea228.exe 1840 Update.exe 1840 Update.exe 1840 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeRun = "C:\\Arquivos de programas\\Adobe\\reader_sl.exe" Update.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2352 2356 21ffd565d0b8ace569a8e202d8cea228.exe 30 PID 2356 wrote to memory of 2352 2356 21ffd565d0b8ace569a8e202d8cea228.exe 30 PID 2356 wrote to memory of 2352 2356 21ffd565d0b8ace569a8e202d8cea228.exe 30 PID 2356 wrote to memory of 2352 2356 21ffd565d0b8ace569a8e202d8cea228.exe 30 PID 2352 wrote to memory of 2536 2352 net.exe 28 PID 2352 wrote to memory of 2536 2352 net.exe 28 PID 2352 wrote to memory of 2536 2352 net.exe 28 PID 2352 wrote to memory of 2536 2352 net.exe 28 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 2356 wrote to memory of 1840 2356 21ffd565d0b8ace569a8e202d8cea228.exe 31 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 1840 wrote to memory of 2652 1840 Update.exe 32 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34 PID 2652 wrote to memory of 2456 2652 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ffd565d0b8ace569a8e202d8cea228.exe"C:\Users\Admin\AppData\Local\Temp\21ffd565d0b8ace569a8e202d8cea228.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:2352
-
-
C:\Arquivos de programas\WindowsUpdate\Update.exe"C:\Arquivos de programas\WindowsUpdate\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2456
-
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD517bab3a6bf8193e97cd7b312b23cfa2b
SHA10496e902296c2667e05e3975929470ef8bfed853
SHA25651bb53b8e73ad18f0211fe0585271c9a91e90ff94bb749a3f1cef65a7da34927
SHA51246f6944145cbf8bb4d3adb6faa8ba9b9df305b3da06d47d211f3b4098ca078bc2ec717c2a5c86464234f98d38c4893db1b4b59155f48c889cbb33bfc00034a9a