Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
ab3ad66b974827a4c413e7e0052ed00b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab3ad66b974827a4c413e7e0052ed00b.exe
Resource
win10v2004-20240226-en
General
-
Target
ab3ad66b974827a4c413e7e0052ed00b.exe
-
Size
173KB
-
MD5
ab3ad66b974827a4c413e7e0052ed00b
-
SHA1
3b78a56b113b7b24fcbf8c0268c678610919f34b
-
SHA256
bc48242bb64b374836a40e210f5910cb5eea98c819c5b2b7252457978752cb30
-
SHA512
a46475ff42c372870de0686fbcb2a31ad1cdb218749175611c3db39364f55c012f0ec4c4a1b8a2307984af82996b89e50cf7b1305e4bc60b0c3552ad6dcea2be
-
SSDEEP
3072:nNl915Gffjkjyz2pCK+bqirahR+2AoL/0RgB7sSk4cgZmtiB0:NlD5KjkjyipfW5rahQ2AO/0RgBoSxcgU
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2936-1-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/3028-8-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2936-14-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/688-80-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2936-82-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/688-149-0x0000000000270000-0x0000000000370000-memory.dmp upx behavioral1/memory/2936-192-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2936-197-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/memory/2936-198-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" ab3ad66b974827a4c413e7e0052ed00b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3028 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 28 PID 2936 wrote to memory of 3028 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 28 PID 2936 wrote to memory of 3028 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 28 PID 2936 wrote to memory of 3028 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 28 PID 2936 wrote to memory of 688 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 30 PID 2936 wrote to memory of 688 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 30 PID 2936 wrote to memory of 688 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 30 PID 2936 wrote to memory of 688 2936 ab3ad66b974827a4c413e7e0052ed00b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exe"C:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exeC:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exeC:\Users\Admin\AppData\Local\Temp\ab3ad66b974827a4c413e7e0052ed00b.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5854f745930fde3577dd6387089c6e37b
SHA171aa9d0a397dd0fe83e31366e1b59e9b786bff6e
SHA256bf97b5934b1de52c81ea8ed07c73d62e38672a165c1841c81f4826a8c0f7a3ec
SHA51252077811438f3acc7762ffbd1cd8b1f2e427c32733355ca4e844596e2ec586c6586a7c88b289b8166bb858ade4787be5ed9a09fe8b1e3beb90a08982e9bb2db4
-
Filesize
1KB
MD583edf87f64b3a24907749f999428e1d0
SHA17669c473d7fd82e6acb157eba167a072286cf27b
SHA25642b9897549695f612f0e3fe3faeddee02fced2d788056e8d266bcff2b2430c89
SHA51227952e40e5e90e415b56bd7c1d6bf5ac8f6ea2398b760956ed4503834983bb9e16fd616ceea216582d54f8407ad84d768fc4778a68e6deabcbb46bfc6f0c9da4
-
Filesize
600B
MD5978b911d12eca503b5450239e6efeafd
SHA1ceef1a7bae990186ea9141c928e0adc619ed2688
SHA2563f094c41f41f27d4d3bdb927e5e3055011973abed965e72d0e717e17a54051dd
SHA51242dbb9b89717c06e39f1949418567e8124f2067bf1cae5382d3ebbecce0624a6487df47924a2d754df12e68b5fe949ea01fae6557082d8a14ab3d85cf2ff8030