Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 00:39

General

  • Target

    21ffd565d0b8ace569a8e202d8cea228.exe

  • Size

    373KB

  • MD5

    21ffd565d0b8ace569a8e202d8cea228

  • SHA1

    479c6f98c5d813ceca23e16cf468c547a039fb7e

  • SHA256

    f71f0b4ae3c220ae543931d39165f79da9d9a4de0b74c2890d05a7b8c62e258a

  • SHA512

    832efdf964eab08dbf863803e37d40e8c2b6e095bb31b29a65d52aa6d530f8d040b2b02a4eac64392d8a1d745f4be57fec181fd3f1e4113731b038aabe8d2c4f

  • SSDEEP

    6144:9vvu41TrJNFWyDVa6c83u8p3soPJkHUvhgSNDc1SQ3Tx:93TR5p3LpDPSchvDc1djx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ffd565d0b8ace569a8e202d8cea228.exe
    "C:\Users\Admin\AppData\Local\Temp\21ffd565d0b8ace569a8e202d8cea228.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\net.exe
      net stop SharedAccess
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2352
    • C:\Arquivos de programas\WindowsUpdate\Update.exe
      "C:\Arquivos de programas\WindowsUpdate\Update.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\net.exe
        net stop SharedAccess
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop SharedAccess
          4⤵
            PID:2456
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop SharedAccess
      1⤵
        PID:2536

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Arquivos de Programas\WindowsUpdate\Update.exe

              Filesize

              444KB

              MD5

              17bab3a6bf8193e97cd7b312b23cfa2b

              SHA1

              0496e902296c2667e05e3975929470ef8bfed853

              SHA256

              51bb53b8e73ad18f0211fe0585271c9a91e90ff94bb749a3f1cef65a7da34927

              SHA512

              46f6944145cbf8bb4d3adb6faa8ba9b9df305b3da06d47d211f3b4098ca078bc2ec717c2a5c86464234f98d38c4893db1b4b59155f48c889cbb33bfc00034a9a

            • memory/1840-31-0x0000000000400000-0x0000000000475000-memory.dmp

              Filesize

              468KB

            • memory/1840-30-0x0000000000400000-0x0000000000475000-memory.dmp

              Filesize

              468KB

            • memory/1840-29-0x0000000000400000-0x0000000000475000-memory.dmp

              Filesize

              468KB

            • memory/2356-8-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-7-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-9-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-10-0x0000000075180000-0x0000000075189000-memory.dmp

              Filesize

              36KB

            • memory/2356-13-0x00000000752A0000-0x00000000752AC000-memory.dmp

              Filesize

              48KB

            • memory/2356-14-0x00000000754C0000-0x00000000755B0000-memory.dmp

              Filesize

              960KB

            • memory/2356-12-0x0000000075AE0000-0x0000000075AEA000-memory.dmp

              Filesize

              40KB

            • memory/2356-11-0x0000000000270000-0x0000000000271000-memory.dmp

              Filesize

              4KB

            • memory/2356-0-0x0000000000400000-0x0000000000475000-memory.dmp

              Filesize

              468KB

            • memory/2356-6-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-5-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-4-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-24-0x0000000000400000-0x0000000000475000-memory.dmp

              Filesize

              468KB

            • memory/2356-28-0x00000000754C0000-0x00000000755B0000-memory.dmp

              Filesize

              960KB

            • memory/2356-27-0x0000000075AE0000-0x0000000075AEA000-memory.dmp

              Filesize

              40KB

            • memory/2356-26-0x0000000075180000-0x0000000075189000-memory.dmp

              Filesize

              36KB

            • memory/2356-25-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-3-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-2-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB

            • memory/2356-1-0x000000007EF50000-0x000000007EFAC000-memory.dmp

              Filesize

              368KB