Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
49c9153d4515e88a2afc2d51feae2422.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49c9153d4515e88a2afc2d51feae2422.exe
Resource
win10v2004-20231222-en
General
-
Target
49c9153d4515e88a2afc2d51feae2422.exe
-
Size
166KB
-
MD5
49c9153d4515e88a2afc2d51feae2422
-
SHA1
571baecd60787a733688f48e1a5450947d90697c
-
SHA256
e0b61ca2d58d5feb22ca259b7773ed584bff6ee07c1d1da7c6e61700926a4f8d
-
SHA512
62a6cb9919b6e39bbdf626af6f1e4460466b45032042b1f5a39afb07450dfa57fdd6cb330c39c5a4dcedd3efa73979d39943c5094d16e74a66db35e46afd0a9d
-
SSDEEP
3072:dq6j9G8ZNe6josCrviHwx2267RwnGVRh4hyESGPmM:Xj8+6vZl67k0shyESM
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2000-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2912-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2912-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1488-78-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1488-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2912-145-0x0000000000570000-0x0000000000670000-memory.dmp upx behavioral1/memory/1488-147-0x0000000000290000-0x0000000000390000-memory.dmp upx behavioral1/memory/2000-182-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2000-183-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 49c9153d4515e88a2afc2d51feae2422.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2912 2000 49c9153d4515e88a2afc2d51feae2422.exe 28 PID 2000 wrote to memory of 2912 2000 49c9153d4515e88a2afc2d51feae2422.exe 28 PID 2000 wrote to memory of 2912 2000 49c9153d4515e88a2afc2d51feae2422.exe 28 PID 2000 wrote to memory of 2912 2000 49c9153d4515e88a2afc2d51feae2422.exe 28 PID 2000 wrote to memory of 1488 2000 49c9153d4515e88a2afc2d51feae2422.exe 30 PID 2000 wrote to memory of 1488 2000 49c9153d4515e88a2afc2d51feae2422.exe 30 PID 2000 wrote to memory of 1488 2000 49c9153d4515e88a2afc2d51feae2422.exe 30 PID 2000 wrote to memory of 1488 2000 49c9153d4515e88a2afc2d51feae2422.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exe"C:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exeC:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exeC:\Users\Admin\AppData\Local\Temp\49c9153d4515e88a2afc2d51feae2422.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5700a6ddb9819b2ab0e5d11654e173ece
SHA13923b7b69ab5726f1daec113b78db92fcb7bf79a
SHA256c686af073fc87b420c15af4cd773268449b0f4cd0b0d97b26e1452a07ac95843
SHA5128f9e606e0479aed708e25c8a8fde2cb690f2dd556a33b58f70f6714ce850549411fcca98f1608aee2053f6b940d1f8d856dae22fb7c918f2591768acd8f55e18
-
Filesize
600B
MD5ab3e61c1c49679a925773f36290a885e
SHA166aed04ef5ca346f15ca5bdfcebf84dc5f4b9d8b
SHA256569cd5efe4a7e24de499d40c39424c0e4b374bd1fe8ca853a2c5a117af7da438
SHA5129b7f7281fd6af45ebd9ba9146a31199b0a06efe1142e7400bdd89a0c062f41e1ff34b1cbdf5f20b93521223d54b5c219e745e1d23c5ec2176751e608406e8f5c