Analysis

  • max time kernel
    361s
  • max time network
    368s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 14:39

General

  • Target

    0e971ff0e7f4cd4714931ac6bb685d91e28b34070866c9e7c976817aa5f6eb8d.exe

  • Size

    179KB

  • MD5

    8e0e472d93c3ebeb725099bc1bbe0a9a

  • SHA1

    7229e11205e794c75a65587bcef040ed345b3322

  • SHA256

    0e971ff0e7f4cd4714931ac6bb685d91e28b34070866c9e7c976817aa5f6eb8d

  • SHA512

    74a63a29a6ea5cfd2f7983b9828dd7a78b3d16072f5e044e795404eb67a2178ac091e15c9a29bafa7b9e7426c6aa709697cb9705ff25f7e40c9597ad1758eda3

  • SSDEEP

    3072:2Rb6HWdU1NByFMuIBRC0eXLfQzueFsB0yxfWolUJFMXNsz5SkE+pbt8ICjGs:IbeBRmXLP0yJAJFMXNXyC

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e971ff0e7f4cd4714931ac6bb685d91e28b34070866c9e7c976817aa5f6eb8d.exe
    "C:\Users\Admin\AppData\Local\Temp\0e971ff0e7f4cd4714931ac6bb685d91e28b34070866c9e7c976817aa5f6eb8d.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1516
      2⤵
      • Program crash
      PID:612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSSres00001.jrs

    Filesize

    1.0MB

    MD5

    ed90ea3c480cedd49b1ea9d09bc3594b

    SHA1

    987f6ce7b5d2432167cfcf129f800bc4e42d50d5

    SHA256

    2ccd2fecb70615bd21d3d7517b12271e5523642c5efeb443a7354a98c1bae860

    SHA512

    8deeeefeaa2542dc55da5cc6d184fd20c2b9f751903daf01db30ae0431d43eac3df90fad02f18012cfd7349ef230e2dcf7c42e2d3524f594572686048fef35eb

  • C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi

    Filesize

    140KB

    MD5

    5c8d1f25fa219557d1258b9c93783fd9

    SHA1

    359eabd8c7884b4893f59238191b5ed570cdd6ca

    SHA256

    7a35ddc1a8df5ddb55f282800693da33646e05670f4aab082e01913e5a75ac14

    SHA512

    0ae2fb4c4ad1134084ea7b49c920c17909ce93b426a820d9f2fe5a8667c8d9520741e14dfcc62eee5b00c59c1561a846f9da6d1eb716246a0fe424d1ff3278fa

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\heavy_ad_intervention_opt_out.db-journal

    Filesize

    16B

    MD5

    b4a9117719656f6534c921c67700dbf0

    SHA1

    56773c00a1bfebecaeb06b25d2e3845181e45f82

    SHA256

    edb9e310ffb5d1a7a341d906812a1ac785a20e2e527bafb5ffcc048bca37931a

    SHA512

    8838b686a4865db8e523add549790ce1df8fcfb15c775fa4836ac05dc2ae7f2620c8761c9e8fe0859ed2570d0821fdc5626dee43db4d3e703b14cea5128e00de

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\CURRENT

    Filesize

    32B

    MD5

    9746006aa6d195a3127df78872c132cf

    SHA1

    ecf53b5877c444510e14247abfdf98c55a472e0b

    SHA256

    e22729824fb6f814ad34623be79fc79dcff8a63a2e3721e7110a0140227eda91

    SHA512

    cda4ebbf069cf710b9f90d3f380705f70ee86f5fd1e8da51088c37ffe9df56bb6f464f30cc3b49a4aefa67b944846a953fe6ebec95ab07d54b6b3900adb9e9e4

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms

    Filesize

    28KB

    MD5

    e8448b35709cf055b117e4b3d15e95ea

    SHA1

    5598e9c8f590fdfac78f4710d4d7234b194e98ae

    SHA256

    887c3a40b0cff5665493e53f5a84925b2f5513910c64587fbf66d8d322261370

    SHA512

    61b82db72f0ef0887678f81f2588f1dce41a50e49ee9c35b1f8cc479481321c758e11e41803ed26745c313afe11e435bdb76ad958d9c364baa4d510edad921b0

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z2ud2i1e.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite

    Filesize

    48KB

    MD5

    3e50ca8928b768f1ac0ab7f42e54d4fb

    SHA1

    5e8bb145dc51579fd17d715bf7a3eade13cc1c90

    SHA256

    adb4fe32e7c38e727b4c07d4fc34262832aeec45a84ccb012456e1816a29d9d4

    SHA512

    8a175e62e93a17e6a6e450a1ad06259713e6a981e47616410943c3eff90f2a504d0ac6d2534f8e77f06e0e077497645811b187a502beb3d5b024064acfebc88d

  • memory/2052-1-0x0000000073FA0000-0x000000007468E000-memory.dmp

    Filesize

    6.9MB

  • memory/2052-0-0x00000000011D0000-0x0000000001204000-memory.dmp

    Filesize

    208KB

  • memory/2052-2-0x00000000010D0000-0x0000000001110000-memory.dmp

    Filesize

    256KB

  • memory/2052-232-0x0000000073FA0000-0x000000007468E000-memory.dmp

    Filesize

    6.9MB

  • memory/2052-274-0x00000000010D0000-0x0000000001110000-memory.dmp

    Filesize

    256KB