Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 06:35

General

  • Target

    4ab285feb1b4d06f8af34199ef42c8ba.exe

  • Size

    1.6MB

  • MD5

    4ab285feb1b4d06f8af34199ef42c8ba

  • SHA1

    d4e3dcd7b30e5e8b1a64d08b68b04ade4241e9e6

  • SHA256

    778488340b7251649c57c20db388fdd4c8fe51fc53193cba47ca57d4c4acf033

  • SHA512

    4e4dbfa1907024f340cbbea9d2eaa21ccb4c198897f6d539210eca8aa7ea79cf27876f114e6324b48327e5fb37ae02e1299094961d2d6f5c7b17fdba59f4325b

  • SSDEEP

    49152:+bfcx2eIzRet6PPwyo2MIvJtoiQKusITOtr3:+gx/My6vJ+gue

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe
    "C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe
      "C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_62421a90"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pkg_62421a90\autorun.txt

    Filesize

    124B

    MD5

    e0d4d58403775a0a8c1a47474e361a82

    SHA1

    d58fb871665b106659a29bb664d29a38773ef941

    SHA256

    1ece227b42dcb95613ca0b3a6a13231cd5f313feb544eb985c3a0a6b54ffb6d2

    SHA512

    2fd6449ff00ffabe2ec113536d230c2e59a3bd87786e4d706fe0bd80e0e4988ba3accc3e136ff94b4bb3469e5a053224379ba2cd7a3b082890e73df644ec861a

  • C:\Users\Admin\AppData\Local\Temp\pkg_62421a90\wrapper.xml

    Filesize

    1KB

    MD5

    3db83f039ef0c6d0f9a2db8e02ab744a

    SHA1

    f0ef7f3666933e3d46f2467f7a48722078de6615

    SHA256

    9a7e0e42263fce0d4521921818a757ff2ca485d16052e8e3287bc281a323daf6

    SHA512

    ba9b807533475d4629b6c798e1fb5ea6a385e26885023461c0167a7effd1878875be5a5c3206c1d04e06c45a929eb841d2bb53663628874b2f030cb2ae0155f1