Analysis
-
max time kernel
124s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 12:18
Behavioral task
behavioral1
Sample
1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe
Resource
win7-20231215-en
General
-
Target
1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe
-
Size
1.3MB
-
MD5
c33f5f08777fec1841d592fb52247ab3
-
SHA1
754b6f9f50942326a1bfc4a48cbe9470d4d0efd2
-
SHA256
1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3
-
SHA512
8b7f0c9bb8165ca0b8f52ee1874724114d3db43933b7335856015abd91597f2168dbea4972fed10554a37b708dc760e8507a586b4fe4b3adf7c76ad8ffd6f325
-
SSDEEP
24576:Qak/7Nk4RZqaoKZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/zZu+k0WdEacJRIo+E
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\L: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\V: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\W: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\J: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\N: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\Q: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\R: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\T: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\U: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\X: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\H: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\G: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\I: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\M: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\O: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\Y: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\E: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\B: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\P: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\S: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\Z: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe File opened (read-only) \??\A: 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4376 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe Token: SeDebugPrivilege 4376 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe Token: SeDebugPrivilege 4224 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe Token: SeDebugPrivilege 4224 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4224 4376 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe 90 PID 4376 wrote to memory of 4224 4376 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe 90 PID 4376 wrote to memory of 4224 4376 1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe"C:\Users\Admin\AppData\Local\Temp\1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe"C:\Users\Admin\AppData\Local\Temp\1a858eefea9b6c58ad702888fec73660b725d4adff15a7900f39bea5bdff1eb3.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4224
-