Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 23:55

General

  • Target

    c46f066555bae74008b6b2aac011ceb8.exe

  • Size

    585KB

  • MD5

    c46f066555bae74008b6b2aac011ceb8

  • SHA1

    61d2bfb7dc5faa94d974bda86f82b2e0c0e32a8f

  • SHA256

    8d45c9abb56000c89333861a27dfe09af39fc3c21383920c8397277d20393cca

  • SHA512

    ae3ee6818ddec69386f5541c7f7b47dd640c555a8306705d093933f0c784b0e32242f6bfe7819ec0b78e734f8d6d7e076855360df6b487cd257584c11fc0f234

  • SSDEEP

    12288:LG2tzSMJb9pZ5RgY2yUNK+upN35jGFpVMbonpEPH0zEBQM1SoSbmKZF:LPxzKtrEPo2QfblF

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe
    "C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe
      "C:\Users\Admin\AppData\Local\Temp\c46f066555bae74008b6b2aac011ceb8.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\453.bat
        3⤵
          PID:1940

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\453.bat

            Filesize

            175B

            MD5

            38570a3652de28aec8aa4ae391ac03f7

            SHA1

            7aee88a379fdc0dbd976ead81c77fe636e345cdc

            SHA256

            af84cbb2b671c48ea16e5dfdc8a933389202b09cdd7e4ed247b32ec76815d208

            SHA512

            a7f3032bd2bf2d60c5d171c6ead8c72044eb9bfe020837e82535a6f08fcb9fc32ffa8640b3c229afc0fd433be616cfdcd899a052e019bd606a249aa4f61ece08

          • C:\Users\Admin\AppData\Local\Temp\63413.exe

            Filesize

            585KB

            MD5

            c46f066555bae74008b6b2aac011ceb8

            SHA1

            61d2bfb7dc5faa94d974bda86f82b2e0c0e32a8f

            SHA256

            8d45c9abb56000c89333861a27dfe09af39fc3c21383920c8397277d20393cca

            SHA512

            ae3ee6818ddec69386f5541c7f7b47dd640c555a8306705d093933f0c784b0e32242f6bfe7819ec0b78e734f8d6d7e076855360df6b487cd257584c11fc0f234

          • memory/4060-0-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB

          • memory/4060-2-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB

          • memory/4060-4-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB

          • memory/4060-3-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB

          • memory/4060-8-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB

          • memory/4060-10-0x0000000000400000-0x0000000000549000-memory.dmp

            Filesize

            1.3MB