Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe
Resource
win10v2004-20240226-en
General
-
Target
ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe
-
Size
94KB
-
MD5
ac6dcd80ccb8e7d6d2dd70f59b66a5c5
-
SHA1
f0881a55cab8efbd96c4b705bcff1153aa314385
-
SHA256
75ef96eea7336cc5282edf804fda8d23fb7ba77d23cab9dd66fa0bdbb4cf7a49
-
SHA512
26eea117933696cb67dc459ac52523943f489f6afe6c145366b96dd6b7285dfa1a6008318b69a1947af81d5e717711ccbb75823cf26c3451aa9ac0c77ac0adfc
-
SSDEEP
1536:aUKgvmnXj8TXda3Is+44umPpZ3V0biEG0J3Xx3brcaTn/EmP3yc+k5:aJwX+b4xfV0GE1VtnczEFD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2524 msDB33AF4A.nls -
Executes dropped EXE 1 IoCs
pid Process 2524 msDB33AF4A.nls -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\DelTemp0069 = "cmd.exe /c del \"C:\\Users\\Admin\\AppData\\Local\\Temp\\msDB33AF4A.nls\"" msDB33AF4A.nls -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 2524 4348 ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe 93 PID 4348 wrote to memory of 2524 4348 ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe 93 PID 4348 wrote to memory of 2524 4348 ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe"C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\msDB33AF4A.nls"C:\Users\Admin\AppData\Local\Temp\msDB33AF4A.nls" "C:\Users\Admin\AppData\Local\Temp\ac6dcd80ccb8e7d6d2dd70f59b66a5c5.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD586fe5b9e7f22247285d366ed8acc383a
SHA134ec56c9b0e28500bfaf5efd3b3034e202f9954e
SHA2560f8cf1c2173d1fa824073399313bf31e7e08f850f671bf781474e99eee1089a5
SHA512a066d299ed3589ad069523b893b513f83c1b2834ad206386e43fa6c4c432a4560c560d1dbcf8c9c49c94982536e0260c9183a0c3b6bee200798023f3b97ae082