Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 01:36

General

  • Target

    230348859fd28e85ef0bdbd2ba2ec666.exe

  • Size

    523KB

  • MD5

    230348859fd28e85ef0bdbd2ba2ec666

  • SHA1

    bde20ad5521bbc60d09dea6c5cb7afc41ea32cb7

  • SHA256

    90a23b6b7ac7d0b33a1bdfeef9538dd9b2fba3ef2560635c0967f79f22d1cd1b

  • SHA512

    a0ebee7d93156d183239b13961e723f30e3b8ea0621cfa9282698ca9f1ee645533c27118b731706d5e992b18f8ac7a65377eab2a2612bd3284ad1da4483ada7f

  • SSDEEP

    12288:e6IAqCqgsSkMhiFtuPDOH7z8LjUXrjrD8pR9B7bKAp:mBEkMhi3Y07QLjUXrz8v9B72Ap

Malware Config

Signatures

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe
    "C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe
      C:\Users\Admin\AppData\Local\Temp\230348859fd28e85ef0bdbd2ba2ec666.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3092-0-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/3092-3-0x0000000010000000-0x0000000010082000-memory.dmp

    Filesize

    520KB

  • memory/3948-1-0x0000000013140000-0x0000000013183000-memory.dmp

    Filesize

    268KB

  • memory/3948-4-0x0000000013140000-0x0000000013183000-memory.dmp

    Filesize

    268KB

  • memory/3948-5-0x0000000013140000-0x0000000013183000-memory.dmp

    Filesize

    268KB

  • memory/3948-7-0x0000000013140000-0x0000000013183000-memory.dmp

    Filesize

    268KB

  • memory/3948-8-0x0000000013140000-0x0000000013183000-memory.dmp

    Filesize

    268KB