Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
27779d40cf9721e28d9156fff3427fd9.exe
Resource
win7-20231215-en
General
-
Target
27779d40cf9721e28d9156fff3427fd9.exe
-
Size
675KB
-
MD5
27779d40cf9721e28d9156fff3427fd9
-
SHA1
0f8c1faa039ecd267c4bf6abeac05a1f42ecd827
-
SHA256
7915802821392313e013d32ec289450740c755ad13571906b1e8acf42d7bbf46
-
SHA512
d44b250d535b766ae70f90bb3000e7dee1d37ec0c8887d36e792c31b5719cd87feb564d4f359da34a00e0c666aadf71d8171a93abaaad6deb98ee50e6ee440e1
-
SSDEEP
12288:Ia4Kp9C2oqACKNcXSDza3ta/Phhtt08VDObJd5A88vKMmqAjSLmvKyBrK1GjdslX:8KDCbpcae3EobJd5A88vKMmqAmLmvKyy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 stubdl.exe -
Loads dropped DLL 20 IoCs
pid Process 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 2480 27779d40cf9721e28d9156fff3427fd9.exe 1612 stubdl.exe 1612 stubdl.exe 1612 stubdl.exe 1612 stubdl.exe 1612 stubdl.exe 1612 stubdl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x00080000000195b8-98.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28 PID 2480 wrote to memory of 1612 2480 27779d40cf9721e28d9156fff3427fd9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\27779d40cf9721e28d9156fff3427fd9.exe"C:\Users\Admin\AppData\Local\Temp\27779d40cf9721e28d9156fff3427fd9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\nst28D6.tmp\stubdl.exeC:\Users\Admin\AppData\Local\Temp\nst28D6.tmp\stubdl.exe ~URL Parts Error~~~~URL Parts Error~URL Parts Error~~#~1836~3470~~URL Parts Error~~SendRequest Error~46-4D-43-A1-33-DD~#~~~SendRequest Error~2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55264f7d6d89d1dc04955cfb391798446
SHA1211d8d3e7c2b2f57f54a11cb8bc4fa536df08acc
SHA2567d76c7dd8f7cd5a87e0118dacb434db3971a049501e22a5f4b947154621ab3d4
SHA51280d27ee2f87e2822bd5c8c55cc3d1e49beebb86d8557c92b52b7cbea9f27882d80e59eefa25e414eecee268a9a6193b6b50b748de33c778b007cde24ef8bcfb7
-
Filesize
66KB
MD5b140459077c7c39be4bef249c2f84535
SHA1c56498241c2ddafb01961596da16d08d1b11cd35
SHA2560598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67
SHA512fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
16KB
MD524a7a119e289f1b5b69f3d6cf258db7c
SHA1fec84298f9819adf155fcf4e9e57dd402636c177
SHA256ae53f8e00574a87dd243fdf344141417cfe2af318c6c5e363a030d727a6c75d1
SHA512fdbbedcc877bf020a5965f6ba8586ade48cfbe03ac0af8190a8acf077fb294ffd6b5a7ae49870bff8cacd9e33d591be63b5b3d5c2e432c640212bdcd0c602861
-
Filesize
80KB
MD57d901ec0b0c73772ea3c8179da0314cd
SHA1781534f4014768b9d6bdf66d4fba2746219eee12
SHA2569c068bc2ffd61cf0f25372800562a12952a75aef3bbe8a22ab23e86edb606d9a
SHA512ececa2b045589199153458c1cfd06373c02528cbcc1483f4661a245272ae6962e4ca73c4f72282fa0759e9ccdf84fac710526743b1540ad92896dd6cc57b7992