Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 09:28

General

  • Target

    407eaa1c3f251b3275c9c397d58f724e.exe

  • Size

    7.6MB

  • MD5

    407eaa1c3f251b3275c9c397d58f724e

  • SHA1

    4edb2e1f3ce9199f08df7169ee3ba7d0e4a8039a

  • SHA256

    26798421b6135d50554b84f81642acc918a7b5d7a5f0fcbb103b93e26395f3d1

  • SHA512

    4d878f07f05cee2b7e787c3f6262ce3abdae96c694cfabcfccc3d5ba9d10411caf549e3418921ea59784ff0d9cf41ff0e18dc09884030b8ab9de24f4b20376d9

  • SSDEEP

    196608:yaWFPZGDGp38ZwSbGbRjmpGkimF2MJtmMSmm6K2fDlA/YeVI:yrFRGDGp38K3bNmp7pnxK2fDlURVI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\407eaa1c3f251b3275c9c397d58f724e.exe
    "C:\Users\Admin\AppData\Local\Temp\407eaa1c3f251b3275c9c397d58f724e.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:1540
  • C:\Windows\servbrow.exe
    "C:\Windows\servbrow.exe" /Service
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\servbrow.exe
      "C:\Windows\servbrow.exe" /Popup
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll

    Filesize

    96KB

    MD5

    1b0d28a8214973ef588079eaa05cec44

    SHA1

    812c4d4017bec569b5d65d8643148487d22f0d20

    SHA256

    8bee17525368bbc3c86767c4a6239417b5d889b1eaff006e1888c1c198f00c5f

    SHA512

    9e7bc2722e63c3ed9a8025d8cbb74ec73e38e8977fa4a838c62101dd3d1514b7ca10f4955285c20c285946bfa7ac8be11b807cb651f14c85a40d7f744425b808

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8bca1df8d1bd481c7d4668da00f2007b

    SHA1

    736095b770f7109a10e09bf81d2be8e83f8af7b6

    SHA256

    0d2dd926ee89e2e0c0901e6c518c74fafb27bc1901b05167e774a31d12b89106

    SHA512

    310b6025d030a747ed0e6ca8f6764d0d3d4470c5cab7159c16c1082c1957b837e98122ead59d11d9530eeb289da101b845e50bd2a8e2f9363764bddfb73a1a62

  • C:\Windows\servbrow.exe

    Filesize

    381KB

    MD5

    5bce9f3768fbadca737a4eb370fc62b5

    SHA1

    0e8f6681d660091ba37e56cf4ffc2ade4cc02ff6

    SHA256

    43c6759e32d2d90453af7125dde3e508135af66b18de50ad3cde966b660de227

    SHA512

    0537ef104007e15b08500d29c7b79aaa9b52232ac39dfebe35ba71540bd26d856f67402136591ed7bf98b4bc4da27499b44f6bae132fef8d6165d237c29c6453

  • C:\Windows\servbrow.exe

    Filesize

    893KB

    MD5

    3eff329effd1ab2208c210a53abc23ac

    SHA1

    b9e2d572d2ab63eaca0d4194329f647167fa95b1

    SHA256

    ed8d53dacf58413e0654b7cbfab1709f0ea47028eb370c7446aa14e72f91e0ed

    SHA512

    12a4322ba291db601dcf44e176ec2cce539b10c92e21b6530017874e6c5dab1458d9150bbcd4a36441510d3603d56018c31d846aebf1d3fa6f6d2d1a62b87e04