Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
593e17125bd844543159d40b03f75c8f.exe
Resource
win7-20231215-en
General
-
Target
593e17125bd844543159d40b03f75c8f.exe
-
Size
92KB
-
MD5
593e17125bd844543159d40b03f75c8f
-
SHA1
441db74d933565d2c22360d38f23e79772c43f6a
-
SHA256
4b8cabae8a2e35cef0d50a79b91c654dd159e6cc7d75d343ff1867ba0cc8607a
-
SHA512
b090082931f381cca3690de1d29a53a62b1baef9d9216fe07f5179f0d6e2b76ef897cf3b120015fbae6a198accfa4a043a58dea4947b25539ecb9f427e3d2a7a
-
SSDEEP
1536:e1u0tXzRvQsfpERs2KSE5VBCucyNazPOdS38uZS/Zm9ZO6e9bFFekmPh4ZS:yjBIPjQAZyNazCSMUAZm9ZO6e9bPekmN
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2860 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
593e17125bd844543159d40b03f75c8f.exedescription pid process target process PID 2188 wrote to memory of 2860 2188 593e17125bd844543159d40b03f75c8f.exe cmd.exe PID 2188 wrote to memory of 2860 2188 593e17125bd844543159d40b03f75c8f.exe cmd.exe PID 2188 wrote to memory of 2860 2188 593e17125bd844543159d40b03f75c8f.exe cmd.exe PID 2188 wrote to memory of 2860 2188 593e17125bd844543159d40b03f75c8f.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe"C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ytk.bat" "C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe" "2⤵
- Deletes itself
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5e6b031b9b7d40fa332ebc6f38b2f9f64
SHA1d6dbffcfcc6a26188fd8d2e5b6257af4821fb48f
SHA25666a04ff993916bce61351e4c3b94ea079c806efb1723c7cd79bd32aaf6847e0b
SHA5127d17655334fcda4c3326110d340fd91cd23ee284dec99c3a8bbc8408342fda5f51e27aaba75fba4cccd513c342c22f07ad2cf6e2326ba575e3cc0eba4ea91948