Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 23:51

General

  • Target

    78b8e523bec99b9ed30727020896bbb3.exe

  • Size

    48KB

  • MD5

    78b8e523bec99b9ed30727020896bbb3

  • SHA1

    3c28f4b5f180532c9b6f48fe6a89b814e3d19a7a

  • SHA256

    7b92f545797f26c7113bbaeb3df0df7b735b65f25b2316658610e20a4db98bc6

  • SHA512

    b0ef052e2b7b61b99fef7c2415a2ca4cd1e6f37dc465ebd98f16f64dcff327693b6f22d8e1a115f9661536f00f76152693e7bbaa2f669d7dedc9c8c24f0a03da

  • SSDEEP

    768:NaKbmM09qIeRiimC4VrvG5S0bQWl/eVXBrADgVAt/r+iSDhC:NaKba93aiiGNuNfl/qx0DUE/rAhC

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b8e523bec99b9ed30727020896bbb3.exe
    "C:\Users\Admin\AppData\Local\Temp\78b8e523bec99b9ed30727020896bbb3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\expolrer.exe
      C:\Windows\system32\expolrer.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2992
    • C:\Windows\SysWOW64\notepad.exe
      notepad C:\Users\Admin\AppData\Local\Temp\Converted_78b8e523bec99b9ed30727020896bbb3.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Converted_78b8e523bec99b9ed30727020896bbb3.txt

          Filesize

          50KB

          MD5

          f21ac006548b1879369f00cc743e2968

          SHA1

          96860a75ef687cbce8883b7a6ce3bec05e33f46f

          SHA256

          7fdde9261fb75146f2980dcf3c6b9987012aafde8e8faa126cbf4618838a7d91

          SHA512

          1f7824fe91b2f7142b0683ce8051074ef575993bdd0bc08972bde2ecf7d30b0fb42e795c7cac2afdb8f8808225efae7c2fc5f3abfeeae313aa3f3894e7a71c8b

        • C:\Windows\SysWOW64\datsobex.wwr

          Filesize

          66KB

          MD5

          2c0ed3ae042d74d45d83a79c445e24ca

          SHA1

          f97c62cd4c4afecb61be638b4af585789015b27a

          SHA256

          3c4bbcbfe91100d826a1a6446f079ab19631816b216e4de6438bef0218d1d482

          SHA512

          2c0f86c5cf792ecda9aff1cf3e8c1af0d7233b6e1319eab44ffb44f8952c9ed2553b96ca34e183d01d05b429819b100f9213a7859342b06f712ac915a67c23fc

        • C:\Windows\SysWOW64\xdatxzap.zxp

          Filesize

          66KB

          MD5

          3e6b53b852c299d0471b8ab348f62651

          SHA1

          0deb6f73e4997eb0a7cd2b68865eca8c0fcd52bc

          SHA256

          7bfbe64c4779c065ae7d4df9fef8e1cb87f7ae68f280a86617cdb41e4a427223

          SHA512

          4d5c75636c4f83d069efb3028fec7a5b383da0c225f9265263cb3bf578c3a754c7b239643761aa34dd43eaba0fefef234aa426d4d7569d2042ad38308f36fbb2

        • \Windows\SysWOW64\expolrer.exe

          Filesize

          48KB

          MD5

          c7468c3d181444c4be997e785c0a7dc6

          SHA1

          2d15b83dcc087243b17d2bc9dd508bfea8091369

          SHA256

          56ee4fdeef95e57c0a864fba868426858cf0f152449644036e89f7f7a6474c15

          SHA512

          9f0b0909c887eb2883365a5bcd6e40296d09685086baabd8f6915c3dd1b919305b61aedb6fb6773809d62bec4bb89b52fb1b0f4a323f06ff4f2e6ab26a1c8108

        • memory/1696-24-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1696-8-0x0000000000390000-0x00000000003C0000-memory.dmp

          Filesize

          192KB

        • memory/1696-15-0x0000000000390000-0x00000000003C0000-memory.dmp

          Filesize

          192KB

        • memory/1696-0-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-26-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-31-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-17-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-27-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-28-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-29-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-30-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-25-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-32-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-33-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-34-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-35-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-36-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-37-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2992-38-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB