Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
4bcd72e6661050516e7b47920e987e29.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bcd72e6661050516e7b47920e987e29.exe
Resource
win10v2004-20231215-en
General
-
Target
4bcd72e6661050516e7b47920e987e29.exe
-
Size
368KB
-
MD5
4bcd72e6661050516e7b47920e987e29
-
SHA1
63ded12a0dcaec76849ff909c2c7dc15820e2bf0
-
SHA256
b893bb8c9bf72dd6d8f0d7c22a1d3d54d5d0d8a5cbb1d4d635b810b74279e5a8
-
SHA512
dcc102aeba89bdd2fb64ff42cf860c347ddad43deb05c11c7bae56744b530b3b4e8aceb7f928a493e23164cafce4e306af23de192d08554019166f96dd04e01e
-
SSDEEP
6144:mh7aPwqyqRcYg4Xklk/T+ERKRaIj+/kGmM3fdjBZRbzL7645SEyeO+2kkI7aC0s:mhWoqy4F2iKcdjBZRL7b5c+4tC0s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 xpos.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\xpos.exe 4bcd72e6661050516e7b47920e987e29.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2724 2844 WerFault.exe 34 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2936 2080 4bcd72e6661050516e7b47920e987e29.exe 30 PID 2080 wrote to memory of 2936 2080 4bcd72e6661050516e7b47920e987e29.exe 30 PID 2080 wrote to memory of 2936 2080 4bcd72e6661050516e7b47920e987e29.exe 30 PID 2080 wrote to memory of 2936 2080 4bcd72e6661050516e7b47920e987e29.exe 30 PID 2936 wrote to memory of 1820 2936 net.exe 28 PID 2936 wrote to memory of 1820 2936 net.exe 28 PID 2936 wrote to memory of 1820 2936 net.exe 28 PID 2936 wrote to memory of 1820 2936 net.exe 28 PID 2080 wrote to memory of 2844 2080 4bcd72e6661050516e7b47920e987e29.exe 34 PID 2080 wrote to memory of 2844 2080 4bcd72e6661050516e7b47920e987e29.exe 34 PID 2080 wrote to memory of 2844 2080 4bcd72e6661050516e7b47920e987e29.exe 34 PID 2080 wrote to memory of 2844 2080 4bcd72e6661050516e7b47920e987e29.exe 34 PID 2844 wrote to memory of 2872 2844 xpos.exe 33 PID 2844 wrote to memory of 2872 2844 xpos.exe 33 PID 2844 wrote to memory of 2872 2844 xpos.exe 33 PID 2844 wrote to memory of 2872 2844 xpos.exe 33 PID 2872 wrote to memory of 2716 2872 net.exe 31 PID 2872 wrote to memory of 2716 2872 net.exe 31 PID 2872 wrote to memory of 2716 2872 net.exe 31 PID 2872 wrote to memory of 2716 2872 net.exe 31 PID 2844 wrote to memory of 2724 2844 xpos.exe 35 PID 2844 wrote to memory of 2724 2844 xpos.exe 35 PID 2844 wrote to memory of 2724 2844 xpos.exe 35 PID 2844 wrote to memory of 2724 2844 xpos.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bcd72e6661050516e7b47920e987e29.exe"C:\Users\Admin\AppData\Local\Temp\4bcd72e6661050516e7b47920e987e29.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:2936
-
-
C:\windows\xpos.exeC:\windows\xpos.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 4083⤵
- Program crash
PID:2724
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess1⤵PID:1820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess1⤵PID:2716
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess1⤵
- Suspicious use of WriteProcessMemory
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD5154ecac6eee82bcb0b41160c93a11287
SHA1904be7d862a95eeb0e279baf2aa4b1b85e84c0d3
SHA2561728e50b9ea4d4d5a3799fdea236565278ece7e3a8abce1146b0ed4ec5997e67
SHA512d5c44ee6492218cbf42b33442fcb09caa7219f2370d0a09846390dc76fea890fd852a4ab828ceaa20739a3813cddc642917e80324812b75c4a46d4764e6709e8