Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
99f64791064fd8a18107ade3ace10d0c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99f64791064fd8a18107ade3ace10d0c.exe
Resource
win10v2004-20231215-en
General
-
Target
99f64791064fd8a18107ade3ace10d0c.exe
-
Size
1.7MB
-
MD5
99f64791064fd8a18107ade3ace10d0c
-
SHA1
fc6206bf8a807de2db6893a21c357b68cfc9138a
-
SHA256
7001e4be648133d081482dc51f088bebbf1d9c56488956fb5f01d57f201805f7
-
SHA512
274c0e0331897f70c8ad1f29b6465a906506ac545c03d946e0882b7ba666db09667efc2787e250af477aa719088307137d00a091e716dd309b82aad751f5c13b
-
SSDEEP
24576:EsReLsRe9UaL2sReLsRe9UaLz3sReLsRe9UaL2sReLsRe9UaLzS:ff4fxf4f7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 99f64791064fd8a18107ade3ace10d0c.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 99f64791064fd8a18107ade3ace10d0c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.181.5\MicrosoftEdgeUpdate.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Java\jdk-1.8\bin\pack200.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{E4FBDD16-2A1A-4FDF-9C8E-10478DC21AD4}\MicrosoftEdgeUpdateSetup_X86_1.3.181.5.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\dotnet\dotnet.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Java\jdk-1.8\bin\rmid.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Java\jdk-1.8\bin\servertool.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\cookie_exporter.exe$ 99f64791064fd8a18107ade3ace10d0c.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AcroRd32Info.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\reader_sl.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrotextextractor.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\eula.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AdobeCollabSync.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\wow_helper.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\ImmersiveControlPanel\SystemSettings.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\_4bitmapibroker.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrobroker.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_64\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_MSIL\SMSvcHost\3.0.0.0__b03f5f7f11d50a3a\SMSvcHost.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_MSIL\WsatConfig\3.0.0.0__b03f5f7f11d50a3a\WsatConfig.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\logtransport2.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File created C:\Windows\assembly\GAC_32\MSBuild\3.5.0.0__b03f5f7f11d50a3a\MSBuild.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\dfsvc\2.0.0.0__b03f5f7f11d50a3a\dfsvc.exe$ 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFontCache\3.0.0.0__31bf3856ad364e35\PresentationFontCache.exe 99f64791064fd8a18107ade3ace10d0c.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adelrcp.exe 99f64791064fd8a18107ade3ace10d0c.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 99f64791064fd8a18107ade3ace10d0c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4508 99f64791064fd8a18107ade3ace10d0c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99f64791064fd8a18107ade3ace10d0c.exe"C:\Users\Admin\AppData\Local\Temp\99f64791064fd8a18107ade3ace10d0c.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD599f64791064fd8a18107ade3ace10d0c
SHA1fc6206bf8a807de2db6893a21c357b68cfc9138a
SHA2567001e4be648133d081482dc51f088bebbf1d9c56488956fb5f01d57f201805f7
SHA512274c0e0331897f70c8ad1f29b6465a906506ac545c03d946e0882b7ba666db09667efc2787e250af477aa719088307137d00a091e716dd309b82aad751f5c13b