Analysis
-
max time kernel
151s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 23:54
Behavioral task
behavioral1
Sample
c9f4b12e0e577b803649fc25a66f5e19.exe
Resource
win7-20240221-en
General
-
Target
c9f4b12e0e577b803649fc25a66f5e19.exe
-
Size
6.7MB
-
MD5
c9f4b12e0e577b803649fc25a66f5e19
-
SHA1
53096e487a06055b4f8d871918564e0314f4216a
-
SHA256
4c1a2e35602396d6e1fd8181dee779c793c6733d1464c8791174a47f6703e407
-
SHA512
449667d233d92ec17a76b23e162cc547132bc8ba7f9fe824a38fc122856c2ef8089d13e798fb8272b977467015063a5ba1e842d3c6c60565e6be48a292e6d6d2
-
SSDEEP
196608:7I+gp1DM9onJ5hrZER9xQ3jo4UX7+bSyKRuAq0G:cpNM9c5hlER9xA2XSbGRu
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe 1680 c9f4b12e0e577b803649fc25a66f5e19.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 11 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1680 4332 c9f4b12e0e577b803649fc25a66f5e19.exe 87 PID 4332 wrote to memory of 1680 4332 c9f4b12e0e577b803649fc25a66f5e19.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"C:\Users\Admin\AppData\Local\Temp\c9f4b12e0e577b803649fc25a66f5e19.exe"2⤵
- Loads dropped DLL
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD57942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
Filesize
84KB
MD5499462206034b6ab7d18cc208a5b67e3
SHA11cd350a9f5d048d337475e66dcc0b9fab6aebf78
SHA2566c2bbed242c399c4bc9b33268afe538cf1dea494c75c8d0db786030a0dcc4b7e
SHA51217a1191f1d5ca00562b80eff2363b22869f7606a2a17f2f0b361d9b36b6e88cb43814255a5bac49d044ea7046b872bac63bd524f9442c9839ab80a54d96f1e6b
-
Filesize
123KB
MD5b74f6285a790ffd7e9ec26e3ab4ca8df
SHA17e023c1e4f12e8e577e46da756657fd2db80b5e8
SHA256c1e3e9548243ca523f1941990477723f57a1052965fccc8f10c2cfae414a6b8a
SHA5123a700638959cbd88e8a36291af954c7ccf00f6101287fc8bd3221ee31bd91b7bd1830c7847d8c2f4f07c94bc233be32a466b915283d3d2c66abed2c70570c299
-
Filesize
64KB
MD560f420a9a606e2c95168d25d2c1ac12e
SHA11e77cf7de26ed75208d31751fe61da5eddbbaf12
SHA2568aa7abe0a92a89adf821e4eb783ad254a19858e62d99f80eb5872d81e8b3541c
SHA512aaf768176cf034004a6d13370b11f0e4bbf86b9b76de7fa06d0939e98915607d504e076ad8adb1a0ebfb6fd021c51764a772f8af6af7f6d15b0d376448aba1a7
-
Filesize
158KB
MD5bc118fb4e14de484452bb1be413c082a
SHA125d09b7fbc2452457bcf7025c3498947bc96c2d1
SHA256ac0ceb8e6b5e67525b136b5ce97500fe4f152061b1bf2783f127eff557b248a3
SHA51268a24d137b8641cd474180971142511d8708738096d865a73fb928315dd9edf46c4ebf97d596f4a9e207ec81828e5db7e90c7b8b00d5f416737ba8bffc2887bf
-
Filesize
78KB
MD50df2287791c20a764e6641029a882f09
SHA18a0aeb4b4d8410d837469339244997c745c9640c
SHA25609ab789238120df329956278f68a683210692c9bcccb8cd548c771e7f9711869
SHA51260c24e38ba5d87f9456157e3f4501f4ffabce263105ff07aa611b2f35c3269ade458dbf857633c73c65660e0c37aee884b1c844b51a05ced6aed0c5d500006de
-
Filesize
150KB
MD566172f2e3a46d2a0f04204d8f83c2b1e
SHA1e74fee81b719effc003564edb6b50973f7df9364
SHA2562b16154826a417c41cda72190b0cbcf0c05c6e6fe44bf06e680a407138402c01
SHA512123b5858659b8a0ac1c0d43c24fbb9114721d86a2e06be3521ad0ed44b2e116546b7b6332fd2291d692d031ec598e865f476291d3f8f44131aacc8e7cf19f283
-
Filesize
192KB
MD56a22bb9144d2723348c915b631639088
SHA1a661d0e3416a8d5d81d70f76deb392854c6ce284
SHA256a8aba081a16dc55f3ef23cf7241acd111648207f766912910cadc9e0c79f134d
SHA512ba122c1421a80384c187dbaac88e9e2fbc93a4ddcda76577e7331d1ca50fb70e1e4ac8415fe02f6a4f4a4124642a52dfaf3bd071d01bd208129f45ecf144af9f
-
Filesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
Filesize
930KB
MD54c057f20964543279abe6349234cd5a6
SHA1278afd4aa32e75a04a032b35a12972222e7bad51
SHA256fc648eda924ca6e8d6441529902db91e9b02db362d2e9ec703a93f7113d6f1a4
SHA5120a7922ebf032659a9758be17afb498afe98d33209118a210457a2d06d4c9b672131105dfb168a9dfcf5a2e5db19280b4375b3995d1bebfc86d7b3d464de33c27
-
Filesize
832KB
MD5b549e52dea213197ba7da72a34613460
SHA1808ffb87e6ac60793bdd68825d509cf07fff98b4
SHA256dddd25c7329a6376579ae4c0ade2bb0d493c00f72ee76c108b23e5330d681ab1
SHA51213f700d374fbcb6ac4629e6af706e190543e68c099eac85251981d5c3004920e30cded79f67f03879e4b0df49af7fb635629e18545d72b0353a97ea9b38f788d
-
Filesize
27KB
MD5a2a4cf664570944ccc691acf47076eeb
SHA1918a953817fff228dbd0bdf784ed6510314f4dd9
SHA256b26b6631d433af5d63b8e7cda221b578e7236c8b34b3cffcf7630f2e83fc8434
SHA512d022da9e2606c5c3875c21ba8e1132ad8b830411d6ec9c4ddf8ebd33798c44a7e9fe64793b8efb72f3e220bb5ce1512769a0398ecc109f53f394ea47da7a8767
-
Filesize
1.1MB
MD55753efb74fcb02a31a662d9d47a04754
SHA1e7bf5ea3a235b6b661bf6d838e0067db0db0c5f4
SHA2569be2b4c7db2c3a05ec3cbd08970e622fcaeb4091a55878df12995f2aeb727e72
SHA51286372016c3b43bfb85e0d818ab02a471796cfad6d370f88f54957dfc18a874a20428a7a142fcd5a2ecd4a61f047321976af736185896372ac8fd8ca4131f3514