Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
231a343831ff5f7c300247441b973aae.exe
Resource
win7-20231215-en
General
-
Target
231a343831ff5f7c300247441b973aae.exe
-
Size
996KB
-
MD5
231a343831ff5f7c300247441b973aae
-
SHA1
d12ab4da1d8caa40549dc0208510ad2d05c73c50
-
SHA256
63843f79934fd93fdd9bd572888f753ebea81c569812ba824376add2280837b4
-
SHA512
094fb456fbacf5c11bf675cc6a9b9f3a4ba670b9eb5d565cf98bacf5086a50eaf0ce77dd33ae15fc31d71fb2cc9efed64a425ddb37fe3659dad9f0a589177491
-
SSDEEP
24576:T95sjkZczo63M87oYbJd5A8uvK0vK8QL5HPf4xVv55:TfsloTYBbSDvK0vKPtvgxVvf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1756 215AppsChecker.exe 1264 dlhelpdl.exe -
Loads dropped DLL 45 IoCs
pid Process 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 1756 215AppsChecker.exe 1756 215AppsChecker.exe 1756 215AppsChecker.exe 1756 215AppsChecker.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 1264 dlhelpdl.exe 1264 dlhelpdl.exe 1264 dlhelpdl.exe 1264 dlhelpdl.exe 1264 dlhelpdl.exe 1264 dlhelpdl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe 2288 231a343831ff5f7c300247441b973aae.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1756 2288 231a343831ff5f7c300247441b973aae.exe 28 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29 PID 2288 wrote to memory of 1264 2288 231a343831ff5f7c300247441b973aae.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\231a343831ff5f7c300247441b973aae.exe"C:\Users\Admin\AppData\Local\Temp\231a343831ff5f7c300247441b973aae.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\nsoA075.tmp\215AppsChecker.exeC:\Users\Admin\AppData\Local\Temp\nsoA075.tmp\215AppsChecker.exe /checkispublisherinstalled2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\nsoA075.tmp\dlhelpdl.exeC:\Users\Admin\AppData\Local\Temp\nsoA075.tmp\dlhelpdl.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~4346~4664~~URL Parts Error~~SendRequest Error~62-DD-1C-0E-CF-51~#~~SendRequest Error~~IE~~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b140459077c7c39be4bef249c2f84535
SHA1c56498241c2ddafb01961596da16d08d1b11cd35
SHA2560598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67
SHA512fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e