Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
7de8f3c3d53fcf85e9e86db85a42a903.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7de8f3c3d53fcf85e9e86db85a42a903.exe
Resource
win10v2004-20231222-en
General
-
Target
7de8f3c3d53fcf85e9e86db85a42a903.exe
-
Size
118KB
-
MD5
7de8f3c3d53fcf85e9e86db85a42a903
-
SHA1
87664fbc7b91b476d5d9a66c1c07e504a1dc6b5b
-
SHA256
d9120ad6f54d5b6022ad8cae7fcddbd84d1956cb297b880f571bcfa5289f958f
-
SHA512
5b4461046696606bf0379e77c0ddf2b329810b26061345a0545731c5c01446c28e638744985792741a1f9d9015e63e2e7ddf714a4586105a522e647a3843de3d
-
SSDEEP
3072:Eaep2EtMKoK5aR2QZArXx/OxvKFK9VeiIdU2fbdztnbXv:LeXMZ8asXxOkK9QTJhD
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2800-1-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3028-5-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2800-64-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3064-70-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2800-72-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 7de8f3c3d53fcf85e9e86db85a42a903.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3028 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 28 PID 2800 wrote to memory of 3028 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 28 PID 2800 wrote to memory of 3028 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 28 PID 2800 wrote to memory of 3028 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 28 PID 2800 wrote to memory of 3064 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 30 PID 2800 wrote to memory of 3064 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 30 PID 2800 wrote to memory of 3064 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 30 PID 2800 wrote to memory of 3064 2800 7de8f3c3d53fcf85e9e86db85a42a903.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exe"C:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exeC:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exeC:\Users\Admin\AppData\Local\Temp\7de8f3c3d53fcf85e9e86db85a42a903.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD576e6acd37f269e1c58fe8ac696eb8821
SHA1174b5512d24d1a5581731c401961bd12c456ee44
SHA2562fb22a2e59cc59a36b92cc13b59b04473b35ea8765eb18735f435f4a646421fa
SHA512636b87e8ce2598c02241209605b9c04602181ab61dba87b3b03c84181bebfefc0b2171b1c2c0ecaff2f536b577f323c692d23b5e37502f81c120690c94ad4c9d
-
Filesize
696B
MD5a7b50b753d26c1482cd0517d55f44926
SHA171aa698b0a9e44a3d893ea8b04b87c3ce85d4461
SHA256055d4b171befcab7711b75c221cb4e8f8f511ed0a2b1445d2940a97852efbcd3
SHA5127d07347e53c198f783a644c18553db89993ad05a69dc3bcab49d19835096ad8396a41713a5c866efe16a7c795fca1e3beda6a858ec3a8e800a2f97ad9884c014