Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
4ab285feb1b4d06f8af34199ef42c8ba.exe
Resource
win7-20231129-en
General
-
Target
4ab285feb1b4d06f8af34199ef42c8ba.exe
-
Size
1.6MB
-
MD5
4ab285feb1b4d06f8af34199ef42c8ba
-
SHA1
d4e3dcd7b30e5e8b1a64d08b68b04ade4241e9e6
-
SHA256
778488340b7251649c57c20db388fdd4c8fe51fc53193cba47ca57d4c4acf033
-
SHA512
4e4dbfa1907024f340cbbea9d2eaa21ccb4c198897f6d539210eca8aa7ea79cf27876f114e6324b48327e5fb37ae02e1299094961d2d6f5c7b17fdba59f4325b
-
SSDEEP
49152:+bfcx2eIzRet6PPwyo2MIvJtoiQKusITOtr3:+gx/My6vJ+gue
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 4ab285feb1b4d06f8af34199ef42c8ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 4ab285feb1b4d06f8af34199ef42c8ba.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\IESettingSync 4ab285feb1b4d06f8af34199ef42c8ba.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 4ab285feb1b4d06f8af34199ef42c8ba.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe 2124 4ab285feb1b4d06f8af34199ef42c8ba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 2124 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 91 PID 3936 wrote to memory of 2124 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 91 PID 3936 wrote to memory of 2124 3936 4ab285feb1b4d06f8af34199ef42c8ba.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe"C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe"C:\Users\Admin\AppData\Local\Temp\4ab285feb1b4d06f8af34199ef42c8ba.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_62421a90"2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5e0d4d58403775a0a8c1a47474e361a82
SHA1d58fb871665b106659a29bb664d29a38773ef941
SHA2561ece227b42dcb95613ca0b3a6a13231cd5f313feb544eb985c3a0a6b54ffb6d2
SHA5122fd6449ff00ffabe2ec113536d230c2e59a3bd87786e4d706fe0bd80e0e4988ba3accc3e136ff94b4bb3469e5a053224379ba2cd7a3b082890e73df644ec861a
-
Filesize
1KB
MD53db83f039ef0c6d0f9a2db8e02ab744a
SHA1f0ef7f3666933e3d46f2467f7a48722078de6615
SHA2569a7e0e42263fce0d4521921818a757ff2ca485d16052e8e3287bc281a323daf6
SHA512ba9b807533475d4629b6c798e1fb5ea6a385e26885023461c0167a7effd1878875be5a5c3206c1d04e06c45a929eb841d2bb53663628874b2f030cb2ae0155f1