Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2024 19:53
Behavioral task
behavioral1
Sample
6375c813fc9d6c53f2268cbb4e51d7fe.exe
Resource
win7-20231215-en
General
-
Target
6375c813fc9d6c53f2268cbb4e51d7fe.exe
-
Size
48KB
-
MD5
6375c813fc9d6c53f2268cbb4e51d7fe
-
SHA1
7b5c424112bd92bb7071f34517e92974facc11e0
-
SHA256
bc57b8e48598918d1a9502250daed583175be5542a8ec2dd30c21006d776af57
-
SHA512
6c429429468fb9da2e8a28a4a11cf252aed99c7a843203373c0c9216217fced31345b97d064ea14b76e0a061b2f6dd8a16895cf59c5dace7814c654c2092b2f7
-
SSDEEP
768:/TvXadySyLwd+FXpQwP/cyQreS75fHgYB7y/MkuFtsFR5KpPfQyjdeWFqNu:Z++FXpQd3reS75fAWypmscpHQt9Nu
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 6375c813fc9d6c53f2268cbb4e51d7fe.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\6375c813fc9d6c53f2268cbb4e51d7fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6375c813fc9d6c53f2268cbb4e51d7fe.exe:*:Enabled:ldrsoft" 6375c813fc9d6c53f2268cbb4e51d7fe.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 6375c813fc9d6c53f2268cbb4e51d7fe.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 6375c813fc9d6c53f2268cbb4e51d7fe.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6375c813fc9d6c53f2268cbb4e51d7fe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3932-0-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-2-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-3-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-5-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-6-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-9-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-11-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-13-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-15-0x0000000000400000-0x000000000145A000-memory.dmp upx behavioral2/memory/3932-18-0x0000000000400000-0x000000000145A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3020 3932 6375c813fc9d6c53f2268cbb4e51d7fe.exe 98 PID 3932 wrote to memory of 3020 3932 6375c813fc9d6c53f2268cbb4e51d7fe.exe 98 PID 3932 wrote to memory of 3020 3932 6375c813fc9d6c53f2268cbb4e51d7fe.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6375c813fc9d6c53f2268cbb4e51d7fe.exe"C:\Users\Admin\AppData\Local\Temp\6375c813fc9d6c53f2268cbb4e51d7fe.exe"1⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\6375C8~1.EXE00.bat2⤵PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5effd006646aac1900f86f003dbae2652
SHA1257ff76dde8fd93a6b816789c7c291674f064ed7
SHA2565c2095152fc90c4d318c058c619a3499b9c87008e702eb5f5b03162e249d82ec
SHA512dd7b468d21f1f5c30dfcc7f1ae3e4492dbc9778992a243e88960522c92bd61c40bdd829bc4e280bf31a05e3aafeefd2082c42a25fb39040e3bf1d87b91976818