Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:43

General

  • Target

    2a788df7324700729a74b9ab8205aa18.exe

  • Size

    130KB

  • MD5

    2a788df7324700729a74b9ab8205aa18

  • SHA1

    477c4caa91fe5e707a4e5695504733572c30e5b1

  • SHA256

    593df76ca0273aa380aa50b84df8fb0a075648f3712dcb336b977f3cceaffb0a

  • SHA512

    5e4a6b25b2fa22a114828c1dfc51c0c575af4b851e0da23e2894a0b8c02eb0a5cba98ca05e95519253990a1296a198f280c7b58411cef5c294c5114ab757c399

  • SSDEEP

    3072:sFSoIkkXuqYfXG5AJg4/SAEZBiBx/1BFNI5wsdaechMcGIeq5i:sF9IkkkfwA3SZZBiBx9XNjsdaecmMD

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a788df7324700729a74b9ab8205aa18.exe
    "C:\Users\Admin\AppData\Local\Temp\2a788df7324700729a74b9ab8205aa18.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2648 -s 36
      2⤵
        PID:804

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpA508.tmp

            Filesize

            114KB

            MD5

            388c8ded00682743e13236501dc4cced

            SHA1

            b150fcadbffdfc1fe212e3a9af6757857e145d1a

            SHA256

            63536eb9a9171281d82474a692ad141e6dd5087b78b5c1da6116506aa27282d4

            SHA512

            864a53d7abdda31a44490801d964c15edde237a10c2ab85982cbf0f21cb64013e0ed58706f95f1b235ecaaad1b32233fd17a40343ac75f661cb367017eccb49a

          • C:\Users\Admin\AppData\Local\Temp\tmpA549.tmp

            Filesize

            46KB

            MD5

            02d2c46697e3714e49f46b680b9a6b83

            SHA1

            84f98b56d49f01e9b6b76a4e21accf64fd319140

            SHA256

            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

            SHA512

            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

          • C:\Users\Admin\AppData\Local\Temp\tmpA58E.tmp

            Filesize

            92KB

            MD5

            27c629ed950ac6d3af5837e9ca3c422b

            SHA1

            e1ebe8b21aa6b38c32d3ef3a5fbfe8e75e238e58

            SHA256

            7cf63b64af2ccf5067e25b539bf7a867441623f0ec7c39f5271c6a3983e088e6

            SHA512

            c8a586719523f3a3b55fc6ad04c8b509fe00c21a7802ae590368edca4c19d7dc326e6cfc75221550d3e86c634611e8103fa8e3c6694222d49184ca56a2bc9ca4

          • memory/2648-0-0x0000000000C90000-0x0000000000CB6000-memory.dmp

            Filesize

            152KB

          • memory/2648-1-0x000007FEF5610000-0x000007FEF5FFC000-memory.dmp

            Filesize

            9.9MB

          • memory/2648-2-0x00000000002C0000-0x00000000002F2000-memory.dmp

            Filesize

            200KB

          • memory/2648-3-0x0000000002110000-0x0000000002190000-memory.dmp

            Filesize

            512KB

          • memory/2648-112-0x000007FEF5610000-0x000007FEF5FFC000-memory.dmp

            Filesize

            9.9MB

          • memory/2648-113-0x0000000002110000-0x0000000002190000-memory.dmp

            Filesize

            512KB