Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
7168d6cb7a843726309ac7e9e11270c5.exe
Resource
win7-20231215-en
General
-
Target
7168d6cb7a843726309ac7e9e11270c5.exe
-
Size
250KB
-
MD5
7168d6cb7a843726309ac7e9e11270c5
-
SHA1
5e159bf5bd0cab0608c391f0dd346b44b0f845e5
-
SHA256
f1ff21fbce368fc1f89e2e49b39af106ea915ee08115876ed8826a331a8cb33a
-
SHA512
47ee7d0ed58a8b90251025189c760ab2af344d475876b8c2c1381105eb690580c450bb696e651137864dfa123d32082651d1f6499ed8ba9aebfd4ad8a96d3e90
-
SSDEEP
6144:EVxQjr+JobI3WLRLxAU5pbOEaRoag0BKVA1:Ewjo3WFLxXjbOEaRrzBP
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 7168d6cb7a843726309ac7e9e11270c5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 7168d6cb7a843726309ac7e9e11270c5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1736 2320 7168d6cb7a843726309ac7e9e11270c5.exe 29 PID 2320 wrote to memory of 1736 2320 7168d6cb7a843726309ac7e9e11270c5.exe 29 PID 2320 wrote to memory of 1736 2320 7168d6cb7a843726309ac7e9e11270c5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7168d6cb7a843726309ac7e9e11270c5.exe"C:\Users\Admin\AppData\Local\Temp\7168d6cb7a843726309ac7e9e11270c5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2320 -s 14522⤵PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5d8de37772f7001ee772940a6ab9d797f
SHA1b3478c678950e64a124df7b4e5ee48d883e513aa
SHA2560cab1204583d4b9f40dc5ea3ae4c9f2acdec2d0370162e75c3c67ef7cde4c246
SHA512fd52c869867ca497da0f8316717edd28c25d5a89389fba8079e1cdd68f44f0dbf736dfb71fb3b4a38b6967891f0644750fc2feab622b01e2ce85fd64c3de1524
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD590f2fbd833b63261c850b610a1648c23
SHA12d2f93ef843d704e442978150165f774e12c0df7
SHA256f3d2266e66a73b2c5ca75641a7aa5e243b4a9457fe9e673477086c58365a597a
SHA5129454c5942ef7852108d6f65d8106202da42fca0e4b3e99e9ee3e0af0051b0c99de0414f5eb9b9e65b048ecfafd16146bd106a6b561c731e2919ff0e4bd1be106