Analysis
-
max time kernel
125s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 10:28
Behavioral task
behavioral1
Sample
992f9ee4cddd999927286ce3c5b3be16.exe
Resource
win7-20231215-en
General
-
Target
992f9ee4cddd999927286ce3c5b3be16.exe
-
Size
176KB
-
MD5
992f9ee4cddd999927286ce3c5b3be16
-
SHA1
adef3d38296d84160ff458d76f05e570d7c92e9f
-
SHA256
3d0c7575efc58d65ece6437cc0fbb58f237b409aec1147c69db5b07098adc25b
-
SHA512
56f017fbc50a3c7ceff710c03035719c9cd722066e65543c425dfd506ec2153f5f7fde4afb395c5b86f1203b764de379a3844e1baa98a17a8e7b8b6193f23ce0
-
SSDEEP
3072:C4B/dZW491jUpgGBNmjYPSQo6kynCnIKHKEbowdsKtQtvW5IbUIg6A:CEE4bkkIVolynCnHKEbps6Ag
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1160 xisp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2280-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/files/0x000c000000023170-4.dat upx behavioral2/memory/1160-6-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/2280-8-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/1160-9-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/1160-10-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/1160-11-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/1160-12-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/1160-13-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\xisp.exe 992f9ee4cddd999927286ce3c5b3be16.exe File opened for modification C:\windows\xisp.exe 992f9ee4cddd999927286ce3c5b3be16.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2280 wrote to memory of 516 2280 992f9ee4cddd999927286ce3c5b3be16.exe 85 PID 2280 wrote to memory of 516 2280 992f9ee4cddd999927286ce3c5b3be16.exe 85 PID 2280 wrote to memory of 516 2280 992f9ee4cddd999927286ce3c5b3be16.exe 85 PID 2280 wrote to memory of 1160 2280 992f9ee4cddd999927286ce3c5b3be16.exe 87 PID 2280 wrote to memory of 1160 2280 992f9ee4cddd999927286ce3c5b3be16.exe 87 PID 2280 wrote to memory of 1160 2280 992f9ee4cddd999927286ce3c5b3be16.exe 87 PID 1160 wrote to memory of 3076 1160 xisp.exe 88 PID 1160 wrote to memory of 3076 1160 xisp.exe 88 PID 1160 wrote to memory of 3076 1160 xisp.exe 88 PID 516 wrote to memory of 2200 516 net.exe 90 PID 516 wrote to memory of 2200 516 net.exe 90 PID 516 wrote to memory of 2200 516 net.exe 90 PID 3076 wrote to memory of 972 3076 net.exe 91 PID 3076 wrote to memory of 972 3076 net.exe 91 PID 3076 wrote to memory of 972 3076 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\992f9ee4cddd999927286ce3c5b3be16.exe"C:\Users\Admin\AppData\Local\Temp\992f9ee4cddd999927286ce3c5b3be16.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:2200
-
-
-
C:\windows\xisp.exeC:\windows\xisp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:972
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5992f9ee4cddd999927286ce3c5b3be16
SHA1adef3d38296d84160ff458d76f05e570d7c92e9f
SHA2563d0c7575efc58d65ece6437cc0fbb58f237b409aec1147c69db5b07098adc25b
SHA51256f017fbc50a3c7ceff710c03035719c9cd722066e65543c425dfd506ec2153f5f7fde4afb395c5b86f1203b764de379a3844e1baa98a17a8e7b8b6193f23ce0