Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 11:22
Behavioral task
behavioral1
Sample
4e2ab21f10e6da062b9354fd2bcc2f25.exe
Resource
win7-20231215-en
General
-
Target
4e2ab21f10e6da062b9354fd2bcc2f25.exe
-
Size
6.6MB
-
MD5
4e2ab21f10e6da062b9354fd2bcc2f25
-
SHA1
80edd1b2aea0c1b670fe7f8b603827dfed993913
-
SHA256
c743aaaa4ff5312ec0a522d3b2b7b9df0f34875a3013e829a7b12ec4424eb660
-
SHA512
fd78be35e8614ac6a9b6be21471ce86525d99820adc5e7b55e2ae370e814919866d642331116e642800b6028aed6e84e168fd4343cf6e12a4e3d1588b0817df9
-
SSDEEP
98304:D1CmDfb+sX1ZvbeAyJZRQ9UeNnhXH6MG8Neiv3VdWpVx8:DsmbCsXDjDyfC9/r6MGUvUz8
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe 3756 4e2ab21f10e6da062b9354fd2bcc2f25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ifconfig.me 28 ifconfig.me -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4540 wrote to memory of 3756 4540 4e2ab21f10e6da062b9354fd2bcc2f25.exe 93 PID 4540 wrote to memory of 3756 4540 4e2ab21f10e6da062b9354fd2bcc2f25.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2ab21f10e6da062b9354fd2bcc2f25.exe"C:\Users\Admin\AppData\Local\Temp\4e2ab21f10e6da062b9354fd2bcc2f25.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\4e2ab21f10e6da062b9354fd2bcc2f25.exe"C:\Users\Admin\AppData\Local\Temp\4e2ab21f10e6da062b9354fd2bcc2f25.exe"2⤵
- Loads dropped DLL
PID:3756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5ade7aac069131f54e4294f722c17a412
SHA1fede04724bdd280dae2c3ce04db0fe5f6e54988d
SHA25692d50f7c4055718812cd3d823aa2821d6718eb55d2ab2bac55c2e47260c25a76
SHA51276a810a41eb739fba2b4c437ed72eda400e71e3089f24c79bdabcb8aab0148d80bd6823849e5392140f423addb7613f0fc83895b9c01e85888d774e0596fc048
-
Filesize
84KB
MD5fb4cc31572e87bd27235e79cbe809066
SHA14264836c0e096bd68c110a27743c7425c49c7627
SHA256fd230c44ced7358a549dfeabd5b7acd0cab94c66cd9b55778c94e3f6ed540854
SHA51264c5a61da120ec12cde621e9e0a5c7c2d4e9631cc5826e6f9ca083d7782c74a8a606e0572d7f268fb99d5c8c30b60a9cf4e9b9a222c4ad1876bdda40bf36d992
-
Filesize
124KB
MD53acd4d8d1ea5deaac665f8be294b827f
SHA10b185ca6badb44148db3eaa03daeddfa472d8b31
SHA25664725476a8f97309215b04d38071941bf8ceaf0534fcca081cbf8e1da31f3b53
SHA5122535363b6c1035fb9f8a7da9b4e82a769540933a3e0a0ab20f1ead389f679c76901c887567a413926fd728f37f4d3710ecae634adb4649477e05f413efa2a549
-
Filesize
64KB
MD5b8c0bd956fdcd86a3fd717a2c1442812
SHA115126e64b4530c0d6533b0b58e38901d571599f1
SHA2569d79786650e7a7eaf028d2b79481fc5675afa6309eee4f7857553818e35dd54b
SHA512010bcb89bb4387122651f6aa25a54e3e06d233318aed3fbd0e071efe265386dbd1260081983fc6f9a91107b84765ed08e7795af73f2acfc2fd6029c2048c3d59
-
Filesize
159KB
MD56ee5579d3fe9a03d3fe486ee66f1ced5
SHA17649fe4d67977c2b18439dfc420c1deafbb0d412
SHA256f7ce997cf23a8e6e79f342aec5c9c7a8f45d9280941bf2986723bc220ed3e094
SHA5126cd6e9077e73ff8ff83b6928758fa08dbb4aefd73a29f7bde9cfcad3535311dfdefbc082f1311bf6bc526ce57ccd6d9ebdedd11ffae18c1697aa8ea24005a092
-
Filesize
78KB
MD57f3066232da4d43420d8a3f6a3024b75
SHA17feb1633a185f5a814b4c61553531ce9ad08e1b7
SHA2562561a4f41702d23045c19827925c59d42acc2e167bc9ae53f0eac3ed2d18e4e5
SHA512cecfaa538af8337d6ba34fc0d11c293b7851c4cbc83a8fe47937093154833be1ef322bc9b574baf0f41a47a1dc6fc0d465275ee8cd90fb36337bd9ad22663512
-
Filesize
150KB
MD5c3b612d5d1627e3a5d2617021e40ee4c
SHA1738177b18736fb83430508832c2d7ab50e2732a4
SHA256a9784768c1f41a8941ed30afeeeb42433154f91bd6e4c425bf8bb78d8cc70c61
SHA512515d5a1ae422ad4eaae28144eea45c1d6d1faba3838a21579256ea781e1cdfeb954e33192fa1139f8873d11d05486760608571ebf9c0b16344b6eb0e21a89aca
-
Filesize
763KB
MD50376b761cd26f3a1cf901db9aa4b53f2
SHA1049e22346ee27d2015d48aea21c3424822fb1ba8
SHA2568acff2d30b63e1f782bf6bceb8faebdd3fe002b7605d79abcc4cf6a9a81bad4e
SHA5127434b2819baacc476dbf6a1e35cac503b2cb05df3ad7f2008768c9afc470cfb885bc42680f9ae4d030bee5d5977a6c24992a5d6d46a4b2edbc75095fbf15cf0c
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
4.3MB
MD564fde73c54618af1854a51db302192fe
SHA1c5580dcea411bfed2d969551e8089aab8285a1d8
SHA256d44753fe884b228da36acb17c879b500aeb0225a38fb7ca142fb046c60b22204
SHA512a7d368301a27ee07a542e45e9ad27683707979fb198b887b66b523609f69e3327d4b77b7edc988c73a4fe26c44bff3abfcd032a991cd730fd8e0de2dad2e3a06
-
Filesize
28KB
MD5f0a0ccc0013628ca15ee36d01d568410
SHA1fac5a6061487c884b8987aa4ca2e098193b5388d
SHA256e357e363a0b381183bf298aadf8708eaaf4e15b8ce538e5dd35d243951e07a87
SHA512f01b75debbd62a7c79464aaec7dee4d4b4087cdc6fb2da4ed1ca3f32fbd4c1798a58fb1e3a0910e611c2513529a0b1bdeecb4a571432ca647a6fc592ee731825
-
Filesize
1.1MB
MD59a0230f1308e5fa5bc116e1007cbb87f
SHA1f934a73dc8c0b2b575dee45b87ea9dcced6d1218
SHA25616cd3b343d9ae9364aa6174f3b77199dd54d60f87a1cb4d99cd0ddbbdb3cfb38
SHA51201d4c161c2869594cf65a105f4586f735b934a485b021439c13088c553faaf766d3d3003bf194c7e4170bb48077b3464b40e5496483c11208cdbf485ff2482c8