Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 17:55

General

  • Target

    72abc5d7e2ea252ed827e2a5c3fbd6b9.exe

  • Size

    11KB

  • MD5

    72abc5d7e2ea252ed827e2a5c3fbd6b9

  • SHA1

    38802c9bd1f19c54be4a70e45f4f2a315b9c9099

  • SHA256

    a70a00f66d825a0696cf21349daae82c59b77bff12586b61a859519b1b7304b8

  • SHA512

    139b886c32b8eac57ddc5f26cf1dd3e5d50debdd938d042ede6ef7448bf51f93aa00833ffc56b75e89f8903f38ae9013aba70a43c660be0ace3c6a2ba02e8f82

  • SSDEEP

    192:ItlG7QATxBYW/03VfZq4TTQYqZIMCZ7ai9Abe:2Q5jYJDq4TTQYqSZ79i

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72abc5d7e2ea252ed827e2a5c3fbd6b9.exe
    "C:\Users\Admin\AppData\Local\Temp\72abc5d7e2ea252ed827e2a5c3fbd6b9.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2836-0-0x0000000000F30000-0x0000000000F3A000-memory.dmp

    Filesize

    40KB

  • memory/2836-1-0x00007FF860440000-0x00007FF860F01000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-2-0x000000001BBD0000-0x000000001BBE0000-memory.dmp

    Filesize

    64KB

  • memory/2836-6-0x00007FF860440000-0x00007FF860F01000-memory.dmp

    Filesize

    10.8MB