Analysis
-
max time kernel
1190s -
max time network
1198s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
24-01-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
Resource
win10v2004-20231215-en
General
-
Target
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
-
Size
15.4MB
-
MD5
48960927f906cbe23a79dc61ff0a2fea
-
SHA1
62ab60890776f8c0188253c61c59706ca5046950
-
SHA256
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8
-
SHA512
3e2d0e487d9138eaedc0529f4c98cb96635886133ce3020af55175a3ca9e3d5bdf81dfcf5c89e54abc916cdf79cbc44c371ff6014f2fad1fd92c9b7c2d05afb4
-
SSDEEP
393216:bZnIdQ+TOgj/C5oo4162qc1kqzp99v93UUxRz:bjQScqwkqTp93UUxV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1460 BraveBrowserSetup.exe 3788 dexket.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
GoLang User-Agent 10 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 71 Go-http-client/1.1 HTTP User-Agent header 2 Go-http-client/1.1 HTTP User-Agent header 21 Go-http-client/1.1 HTTP User-Agent header 67 Go-http-client/1.1 HTTP User-Agent header 69 Go-http-client/1.1 HTTP User-Agent header 70 Go-http-client/1.1 HTTP User-Agent header 11 Go-http-client/1.1 HTTP User-Agent header 13 Go-http-client/1.1 HTTP User-Agent header 34 Go-http-client/1.1 HTTP User-Agent header 35 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe 1460 BraveBrowserSetup.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1460 4872 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 74 PID 4872 wrote to memory of 1460 4872 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 74 PID 4872 wrote to memory of 3788 4872 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 75 PID 4872 wrote to memory of 3788 4872 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 75 PID 4872 wrote to memory of 3788 4872 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe"C:\Users\Admin\AppData\Local\Temp\7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\BraveBrowserSetup.exe"C:\Users\Admin\AppData\Local\Temp\BraveBrowserSetup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\dexket.exe"C:\Users\Admin\AppData\Local\Temp\dexket.exe"2⤵
- Executes dropped EXE
PID:3788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD56e060e3627aa34448ee0deb7cb80cd9b
SHA1758de106ee2675348ed9f5781b683ea0777fbfb7
SHA256e0a5e281f356e47dacfae0198f1fd6d2f253a6ae97237a77ee8648d4e6a08730
SHA512736ef678b3480c235aa1d2359064af897d76b0ca623d1e5b3237598b048f5f5a0f120743dc11eda99540b94153f00f025db74349e8de8bdca3acf0f3425fc79f
-
Filesize
748KB
MD5850b8e86b0585fcfc7ffb9ee685e7f3e
SHA1f8fb2e2a32a8a70bcf52add86b47aebba0a8880d
SHA2566bc054d2beb3c6924bf552814ce04e5cfb7c5c5f6e3500f80c9227d438cb81e3
SHA512d6f4e6a8cbf440db89433d300e4da595cb73bd47c637d1d4b7a96286a1062b4a89d10e1103d6b4d32b70cfcee41ec8ed7fcf0d95ea62f73c6e6ea0cb53deeef3
-
Filesize
352KB
MD509029f599a8b0e1a19db48416c114a94
SHA134346b809c9b13c82b3f609fc5d08306c1f905ca
SHA2568e60925caf18080fb9640f9bd500fcc5107e2a2f13d705c6ffa8347c7352dc4a
SHA512d9f7bfc2a6f051ee7bda6f0d4c56cba9c4e861cc7e05998c53d95c66413621c9823923c6f4078c109df9d874ec8c79876b964e8187c6652d0a3d783414fff9ef
-
Filesize
277KB
MD57666744c229ef4797afe2799fc9edf20
SHA158e63ad66a2daa39a557737c80d19e90cf6675ff
SHA256f72d0552ed946f367bd8219bc60227f96fc5b46eada08bb232ff04107e672281
SHA5120ed581ccc1bda7b3eb2fdf144acf6938b1ffc9ebb6b1f1cd70a002e364aa176a9dbf007166601f999eef0e5e5a777954e50e650478dd57b2a810123ff9f02a1f