Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
80435c956343c13c8eb6252c7229692f.exe
Resource
win7-20231215-en
General
-
Target
80435c956343c13c8eb6252c7229692f.exe
-
Size
224KB
-
MD5
80435c956343c13c8eb6252c7229692f
-
SHA1
471c6efa52c9dec5a0a3e12936b81d225eaf4bd3
-
SHA256
f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd
-
SHA512
cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f
-
SSDEEP
6144:7FCZksD0tc4/sjUAx8sHZJcT9CU63Qyw:4kOj4/sjUAx8oZECtpw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\s.exe 80435c956343c13c8eb6252c7229692f.exe File opened for modification C:\windows\s.exe 80435c956343c13c8eb6252c7229692f.exe File created C:\windows\systemos1.exe s.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1680 2376 WerFault.exe 31 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1968 1972 80435c956343c13c8eb6252c7229692f.exe 28 PID 1972 wrote to memory of 1968 1972 80435c956343c13c8eb6252c7229692f.exe 28 PID 1972 wrote to memory of 1968 1972 80435c956343c13c8eb6252c7229692f.exe 28 PID 1972 wrote to memory of 1968 1972 80435c956343c13c8eb6252c7229692f.exe 28 PID 1968 wrote to memory of 2796 1968 net.exe 30 PID 1968 wrote to memory of 2796 1968 net.exe 30 PID 1968 wrote to memory of 2796 1968 net.exe 30 PID 1968 wrote to memory of 2796 1968 net.exe 30 PID 1972 wrote to memory of 2376 1972 80435c956343c13c8eb6252c7229692f.exe 31 PID 1972 wrote to memory of 2376 1972 80435c956343c13c8eb6252c7229692f.exe 31 PID 1972 wrote to memory of 2376 1972 80435c956343c13c8eb6252c7229692f.exe 31 PID 1972 wrote to memory of 2376 1972 80435c956343c13c8eb6252c7229692f.exe 31 PID 2376 wrote to memory of 2784 2376 s.exe 32 PID 2376 wrote to memory of 2784 2376 s.exe 32 PID 2376 wrote to memory of 2784 2376 s.exe 32 PID 2376 wrote to memory of 2784 2376 s.exe 32 PID 2784 wrote to memory of 2692 2784 net.exe 34 PID 2784 wrote to memory of 2692 2784 net.exe 34 PID 2784 wrote to memory of 2692 2784 net.exe 34 PID 2784 wrote to memory of 2692 2784 net.exe 34 PID 2376 wrote to memory of 1680 2376 s.exe 39 PID 2376 wrote to memory of 1680 2376 s.exe 39 PID 2376 wrote to memory of 1680 2376 s.exe 39 PID 2376 wrote to memory of 1680 2376 s.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe"C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:2796
-
-
-
C:\windows\s.exeC:\windows\s.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9123⤵
- Program crash
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD580435c956343c13c8eb6252c7229692f
SHA1471c6efa52c9dec5a0a3e12936b81d225eaf4bd3
SHA256f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd
SHA512cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8