Analysis
-
max time kernel
181s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
3a69308fc69a181472bba584c49bf276.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a69308fc69a181472bba584c49bf276.exe
Resource
win10v2004-20231215-en
General
-
Target
3a69308fc69a181472bba584c49bf276.exe
-
Size
185KB
-
MD5
3a69308fc69a181472bba584c49bf276
-
SHA1
70a4c032225b763ded2b241934a02059599bbee5
-
SHA256
b3b830308f3c2f3212d528ea6622c19769f8469d34d23939cdbc9c3548661d95
-
SHA512
2b71c67e442d9dbbc0dbec213a9681f5198a2b708853b8a7b216357a8cbeb6c80fb1485056b4fe7605cef056796c0391f3b51e549b78caef112920e04e55b432
-
SSDEEP
3072:T3YFRQ2tC/SGI2iF1F8uWLyTF0vPdN1tpt+AHW0qhPW8tI21EjLKREHci+siVv8T:r8RQ2t8S/x8ufR0vPdrtp9H3qoN21EjD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2248 B6232F3A6BE.exe 4432 wAYFC71.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3100-1-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/2248-31-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/3100-57-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/2248-17-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AXF7XWVXVLDCOYXX = "C:\\Recycle.Bin\\B6232F3A6BE.exe /q" wAYFC71.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\PhishingFilter wAYFC71.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" wAYFC71.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" wAYFC71.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery wAYFC71.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" wAYFC71.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3100 3a69308fc69a181472bba584c49bf276.exe 3100 3a69308fc69a181472bba584c49bf276.exe 3100 3a69308fc69a181472bba584c49bf276.exe 3100 3a69308fc69a181472bba584c49bf276.exe 2248 B6232F3A6BE.exe 2248 B6232F3A6BE.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe 4432 wAYFC71.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3100 3a69308fc69a181472bba584c49bf276.exe Token: SeDebugPrivilege 3100 3a69308fc69a181472bba584c49bf276.exe Token: SeDebugPrivilege 3100 3a69308fc69a181472bba584c49bf276.exe Token: SeDebugPrivilege 3100 3a69308fc69a181472bba584c49bf276.exe Token: SeDebugPrivilege 2248 B6232F3A6BE.exe Token: SeDebugPrivilege 2248 B6232F3A6BE.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe Token: SeDebugPrivilege 4432 wAYFC71.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3100 wrote to memory of 2248 3100 3a69308fc69a181472bba584c49bf276.exe 93 PID 3100 wrote to memory of 2248 3100 3a69308fc69a181472bba584c49bf276.exe 93 PID 3100 wrote to memory of 2248 3100 3a69308fc69a181472bba584c49bf276.exe 93 PID 2248 wrote to memory of 4432 2248 B6232F3A6BE.exe 94 PID 2248 wrote to memory of 4432 2248 B6232F3A6BE.exe 94 PID 2248 wrote to memory of 4432 2248 B6232F3A6BE.exe 94 PID 2248 wrote to memory of 4432 2248 B6232F3A6BE.exe 94 PID 2248 wrote to memory of 4432 2248 B6232F3A6BE.exe 94 PID 4432 wrote to memory of 3100 4432 wAYFC71.exe 84 PID 4432 wrote to memory of 3100 4432 wAYFC71.exe 84 PID 4432 wrote to memory of 3100 4432 wAYFC71.exe 84 PID 4432 wrote to memory of 3100 4432 wAYFC71.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a69308fc69a181472bba584c49bf276.exe"C:\Users\Admin\AppData\Local\Temp\3a69308fc69a181472bba584c49bf276.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Recycle.Bin\B6232F3A6BE.exe"C:\Recycle.Bin\B6232F3A6BE.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\wAYFC71.exe"C:\Users\Admin\AppData\Local\Temp\wAYFC71.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5efee99fee2d880df003e55125e7c5976
SHA1b4cb98328cf083ea87c5c9a4bd13a25bcb9da0eb
SHA256c9c91857cdf7a4df750908a3dc7250454640030d0f1dfce0ca932708557a3693
SHA51210457e17ae1650d7cc6500729d5ac201e499720becedf9d13322f3c9342186941cd9f804c962c365538babac4b4012ff5359bda86eadab868ff30f2c02d9db91
-
Filesize
185KB
MD53a69308fc69a181472bba584c49bf276
SHA170a4c032225b763ded2b241934a02059599bbee5
SHA256b3b830308f3c2f3212d528ea6622c19769f8469d34d23939cdbc9c3548661d95
SHA5122b71c67e442d9dbbc0dbec213a9681f5198a2b708853b8a7b216357a8cbeb6c80fb1485056b4fe7605cef056796c0391f3b51e549b78caef112920e04e55b432
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be