Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 23:04

General

  • Target

    b5e203d62f8fccd1a02bdaf9bdb024d3.exe

  • Size

    121KB

  • MD5

    b5e203d62f8fccd1a02bdaf9bdb024d3

  • SHA1

    f24cb2275a23dcc77dc86d9e931ddcdc5262ca79

  • SHA256

    685c84b329c9b6b12fe75a6edb3f16b130e03f9600200718a8c47b90877af58a

  • SHA512

    f66dd5110d5c065e94e70b704f39cd54c1d5ddc1a6e323ac739afe2de6263d98a89e731fc6823a0321cb1a09ac23b75596e39599c2999cd3f00509b9438b8b20

  • SSDEEP

    1536:hGwbbydEbmTAkVzJ3imFRV3GwMNX7QAiGasPVJ:hraamxz4mXeX7Qe

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5e203d62f8fccd1a02bdaf9bdb024d3.exe
    "C:\Users\Admin\AppData\Local\Temp\b5e203d62f8fccd1a02bdaf9bdb024d3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Users\Admin\AppData\Local\Temp\b5e203d62f8fccd1a02bdaf9bdb024d3.exe
      C:\Users\Admin\AppData\Local\Temp\b5e203d62f8fccd1a02bdaf9bdb024d3.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Roaming\web2net.exe
        "C:\Users\Admin\AppData\Roaming\web2net.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:460
        • C:\Users\Admin\AppData\Roaming\web2net.exe
          C:\Users\Admin\AppData\Roaming\web2net.exe
          4⤵
          • Executes dropped EXE
          • Modifies Internet Explorer start page
          PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\prefs.js

    Filesize

    6KB

    MD5

    2a4779382b78a06ba273f3efc052b559

    SHA1

    824a63bad1fdcda3c1f523c6b80e5f3c74051d84

    SHA256

    08148f316c6bf0e76070c22a4d1e2714fead434b4b6ac91b697232562a4f6046

    SHA512

    2ad14a0dc0f0213a717301c8b965ff5bb1adfe9f625944dbf036acd6899bce6c3f0b1217368aa41f2891be434be1fc13fd111dd81d473a94f37986b0d93737d0

  • C:\Users\Admin\AppData\Roaming\web2net.exe

    Filesize

    121KB

    MD5

    b5e203d62f8fccd1a02bdaf9bdb024d3

    SHA1

    f24cb2275a23dcc77dc86d9e931ddcdc5262ca79

    SHA256

    685c84b329c9b6b12fe75a6edb3f16b130e03f9600200718a8c47b90877af58a

    SHA512

    f66dd5110d5c065e94e70b704f39cd54c1d5ddc1a6e323ac739afe2de6263d98a89e731fc6823a0321cb1a09ac23b75596e39599c2999cd3f00509b9438b8b20

  • memory/1216-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1216-2-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1216-3-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1216-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB