Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
790c0dc8e06b49f065a7247d814bb6aa.exe
Resource
win7-20231215-en
General
-
Target
790c0dc8e06b49f065a7247d814bb6aa.exe
-
Size
1.0MB
-
MD5
790c0dc8e06b49f065a7247d814bb6aa
-
SHA1
97c48d3568cfe2592e5a75f91db1f89774ab3a73
-
SHA256
02f71e98c5c48f61b12c633b5f4012b30fce5e80c165f3f9ee87738631c47ed2
-
SHA512
e93cdc604f0c74613f1e7ea51e86b89bb5c0525d77535340e0617c4191288c728a5e69b578094e2bce69618fccaff030027c1001da1435929220534ce31a4889
-
SSDEEP
24576:kfQYxUhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRto:lo54clgLH+tkWJ0N0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 13 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4916 790c0dc8e06b49f065a7247d814bb6aa.exe 4916 790c0dc8e06b49f065a7247d814bb6aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4916 790c0dc8e06b49f065a7247d814bb6aa.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\DHLZNHLRLyRZDXFw078BFBFF000306D21C0E061965\65078BFBFF000306D21C0E0619DHLZNHLRLyRZDXFw\Browsers\Passwords\Passwords_Edge.txt
Filesize426B
MD542fa959509b3ed7c94c0cf3728b03f6d
SHA1661292176640beb0b38dc9e7a462518eb592d27d
SHA256870ef3d2370932a8938faa60abd47d75ea0af98bfa11c82ae8efe9e94fd8be00
SHA5127def291737d081c93d0cc38ac8d3062fd34d93b68d191eb0d54e9857e0c0afdbcd241471a2e10c28ce8db3b1d1ae0dba2ef6f609cfe8a1e8fe1dd103dba80007
-
C:\Users\Admin\AppData\Local\DHLZNHLRLyRZDXFw078BFBFF000306D21C0E061965\65078BFBFF000306D21C0E0619DHLZNHLRLyRZDXFw\Grabber\DenyExpand.zip
Filesize183KB
MD532d976619cfa8c60a8b07187dd1953d0
SHA1f878895cde98599f38c3236a17c6838e44291aa7
SHA25667e99a0e17088a263f2635f0ccb28657770320b3b34a680fd4a7c3637f74c700
SHA51253e7c22f3ef47216e57cbe8cfdc0137e650b3f8b0b49f2ea11635ead7a41e90b520d99ff2ebca26d2d525e6c36564fe3e334a9560a4ea857463132316c840c50
-
C:\Users\Admin\AppData\Local\DHLZNHLRLyRZDXFw078BFBFF000306D21C0E061965\65078BFBFF000306D21C0E0619DHLZNHLRLyRZDXFw\Grabber\MoveMeasure.jpg
Filesize206KB
MD55188a694ee1d991b51113d0c282caaed
SHA1701a78d97c38af25ff010b27ef87331a7db879e4
SHA2567ff7fc8ffcadeb864619bb0e89b14de0a5145720a9131de28bb5e68fc8d86bda
SHA512bb082ddaf467bc04e2fface163df87eae8f46fc3e5d0349631024aac85eed17beaac697c8c35e116f29ee940f0913f70d6e6ef9c48036b3271c52e9fa4fab471