Resubmissions

21-01-2024 14:52

240121-r8syqaeac7 10

21-01-2024 14:51

240121-r8k8waeac5 10

01-01-2024 13:55

240101-q776kscacp 10

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 13:55

General

  • Target

    63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe

  • Size

    924KB

  • MD5

    ec9c3efe831aaa203058927df7de6138

  • SHA1

    b77581e047551a70aaba0db7a57349136bd9e411

  • SHA256

    63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222

  • SHA512

    0d5aedcebaa660f345c549b9ae07b4d18fc01b563907b378c1cd905029bb0c6f6849e0f03c7c4a724c3448eb9c693138265a0b0129a298af3aada9bb0f447d6a

  • SSDEEP

    12288:tZqu3sRwqpxGCMF3dera2ybCPWy5SqZWj+6GJZy82VS1ToBgdoByOHGae0r2ivr:B3yEoro2PEpUA

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe
    "C:\Users\Admin\AppData\Local\Temp\63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    PID:3816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\B4y0KpD.razy1337

    Filesize

    144B

    MD5

    7916d9e8f15d734e62589c1de65d1db7

    SHA1

    1748d3c62e816840fe9a9073ff3e8c304e05a1ae

    SHA256

    69955ddb5d9accf9becdac9c1aa427d2b15c24b30e5be688e18ac372bb429b48

    SHA512

    f32f18380ea92b6143c2950904413cbba6a5db32822a9ffc87c738ab744b0fca86acc996d58884cc7528c6a4812a07c6062fe3bc61efae5663ed1e42793023d8

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\I3tfOZZ.razy1337

    Filesize

    144B

    MD5

    e683935872483171dda3188337459413

    SHA1

    219fcef9f695fe4e257a761e1ecbfdfec86c072d

    SHA256

    7a0dcefb0b90e217bf7e68802db03c0abeec64caeaecabfa2db37f32087be056

    SHA512

    e6b938d0cfd89d9a9f10426f25bd760eabe305b0fba66044d6be16ace0d703ae1dedbfca63e20c3b440427b488754a3e4dd666c01611a6da127fa5ce4132bf94

  • memory/3816-6-0x0000000004F50000-0x0000000004FE2000-memory.dmp

    Filesize

    584KB

  • memory/3816-4-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/3816-3-0x00000000093D0000-0x000000000946C000-memory.dmp

    Filesize

    624KB

  • memory/3816-5-0x0000000009B20000-0x000000000A0C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3816-1-0x0000000074700000-0x0000000074EB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3816-8-0x00000000050E0000-0x0000000005136000-memory.dmp

    Filesize

    344KB

  • memory/3816-7-0x0000000004EC0000-0x0000000004ECA000-memory.dmp

    Filesize

    40KB

  • memory/3816-9-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/3816-47-0x0000000074700000-0x0000000074EB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3816-52-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/3816-58-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/3816-2-0x0000000004CB0000-0x0000000004D0C000-memory.dmp

    Filesize

    368KB

  • memory/3816-0-0x0000000000250000-0x000000000033E000-memory.dmp

    Filesize

    952KB