Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 14:12

General

  • Target

    7272c8337cd8e1c24bbedc711d5c8c63.exe

  • Size

    7.6MB

  • MD5

    7272c8337cd8e1c24bbedc711d5c8c63

  • SHA1

    5a8fe1dfa771cc0aca1dea34aea6bbbaac2bc57e

  • SHA256

    de8e6d4b87735db9251283f7ed6e8eb67f2e441f4232c32688194089207bfe01

  • SHA512

    816a0a3d09b5745c542dcaef598b4d6f8a06c0052858ed24b6749353aabcb23dbac34366f260807d014b0b2b93e628762b53be211fd050e4287bf830463f4960

  • SSDEEP

    196608:Bbu8/8sQIZqTExhb3N1K2BJuEfjsLIlb6oF5owm5Ndfv:BDzQghbdA4BsE6oF3m35

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7272c8337cd8e1c24bbedc711d5c8c63.exe
    "C:\Users\Admin\AppData\Local\Temp\7272c8337cd8e1c24bbedc711d5c8c63.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:2188
  • C:\Windows\servbrow.exe
    "C:\Windows\servbrow.exe" /Service
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\servbrow.exe
      "C:\Windows\servbrow.exe" /Popup
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll

    Filesize

    647KB

    MD5

    c089da2006f0255ee7f604f8338e9a63

    SHA1

    f9135088c47fd4666d4c24672ef989e6e7b9494a

    SHA256

    01d5bd79d084a08e31abd67d2df559ce69ac3929216db1f7846ea1a9db73cac3

    SHA512

    ac4854ffc1253bb2fff6aecfe9a1dca15ce6801d47e8c295d715e3e8386cde354e499a9f32f0f6e57223a799759f4dcba658457666650ff40b20f68481bdc611

  • C:\Windows\servbrow.exe

    Filesize

    4.3MB

    MD5

    635866bdd400dba27b720cca4a5a4d41

    SHA1

    34d775f2f1d870f8db96c58c330bc622c23275dc

    SHA256

    e5c2a4b236b2ace2fa334ae8da639bc60dee34706f6850afd49428f209c4b612

    SHA512

    393658036dfcd8874c7ebf0fcea5f823f066348d683b6cc3bbc96def82b66b2bd04841e1cee92371b4f96a186d1c7f4a0f9828978e8561a6892f32a664c5d50d

  • C:\Windows\servbrow.exe

    Filesize

    3.9MB

    MD5

    714dc38da5f28a0b97883d92cbc1405d

    SHA1

    175cd4e77b834cd62e878b7a9962687d8d46262e

    SHA256

    b20ea0d736adda8ab5c90d397f205424d171f92da55e0597ac7e0a423b6d5177

    SHA512

    5b195efe8a0848c8bf366101792e73c6e2e9b4c6226d201974171c2aa18176f4df41820ae61df712c3a035b260e6b480684491afb15492d818ddeacf37168cd3

  • C:\Windows\servbrow.exe

    Filesize

    5.1MB

    MD5

    5cbdc6ff36a1a405a816084b868e49b2

    SHA1

    6256dddd0d9dc4c3e4f4fe699e9a704140f208d1

    SHA256

    2f479fe037cd9a1f6f1bbe56b0167d770587b23959e77907560dc699a00bb9e9

    SHA512

    251652a67641b0f168f7251f3a292d6d35d024999c1fc00387daa57949e223afa4b9fafbb26d8d612f5983743a25c476b6231f51cc29b41c58026f416ef65105