Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
593e17125bd844543159d40b03f75c8f.exe
Resource
win7-20231215-en
General
-
Target
593e17125bd844543159d40b03f75c8f.exe
-
Size
92KB
-
MD5
593e17125bd844543159d40b03f75c8f
-
SHA1
441db74d933565d2c22360d38f23e79772c43f6a
-
SHA256
4b8cabae8a2e35cef0d50a79b91c654dd159e6cc7d75d343ff1867ba0cc8607a
-
SHA512
b090082931f381cca3690de1d29a53a62b1baef9d9216fe07f5179f0d6e2b76ef897cf3b120015fbae6a198accfa4a043a58dea4947b25539ecb9f427e3d2a7a
-
SSDEEP
1536:e1u0tXzRvQsfpERs2KSE5VBCucyNazPOdS38uZS/Zm9ZO6e9bFFekmPh4ZS:yjBIPjQAZyNazCSMUAZm9ZO6e9bPekmN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
593e17125bd844543159d40b03f75c8f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 593e17125bd844543159d40b03f75c8f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
593e17125bd844543159d40b03f75c8f.exedescription pid process target process PID 1592 wrote to memory of 3352 1592 593e17125bd844543159d40b03f75c8f.exe cmd.exe PID 1592 wrote to memory of 3352 1592 593e17125bd844543159d40b03f75c8f.exe cmd.exe PID 1592 wrote to memory of 3352 1592 593e17125bd844543159d40b03f75c8f.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe"C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ytk.bat" "C:\Users\Admin\AppData\Local\Temp\593e17125bd844543159d40b03f75c8f.exe" "2⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5e6b031b9b7d40fa332ebc6f38b2f9f64
SHA1d6dbffcfcc6a26188fd8d2e5b6257af4821fb48f
SHA25666a04ff993916bce61351e4c3b94ea079c806efb1723c7cd79bd32aaf6847e0b
SHA5127d17655334fcda4c3326110d340fd91cd23ee284dec99c3a8bbc8408342fda5f51e27aaba75fba4cccd513c342c22f07ad2cf6e2326ba575e3cc0eba4ea91948