Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
c944d68dffe67e2d03f86ccef6304504.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c944d68dffe67e2d03f86ccef6304504.exe
Resource
win10v2004-20240226-en
General
-
Target
c944d68dffe67e2d03f86ccef6304504.exe
-
Size
183KB
-
MD5
c944d68dffe67e2d03f86ccef6304504
-
SHA1
6334a2a9be21fee3d10ba747f24b020c2ac01a2c
-
SHA256
3569b1de9692e5ca5c8a7fb73d52bdabd6bddfd652cab6d10cfb2c2a69c96e6d
-
SHA512
e4839499736c9d8693167e2c53d87065a2f49d72397bcce3d72af44cfdb194d33cdf2841891b85628507c3964e79fa8d18b2750627d7c9944a0891d379648658
-
SSDEEP
3072:RIL4cewfF6FmgF63CLjPentd85YPx37jfA0YC5HE9WVHzYmQWuB:RMY4FobF63OutzPV3fpYCxMkH7u
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" c944d68dffe67e2d03f86ccef6304504.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1168-1-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2708-13-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2708-12-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1168-15-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2372-72-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1168-74-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2708-141-0x0000000000600000-0x0000000000700000-memory.dmp upx behavioral1/memory/1168-142-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2372-143-0x0000000000540000-0x0000000000640000-memory.dmp upx behavioral1/memory/1168-174-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1168-181-0x0000000000400000-0x000000000048C000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2708 1168 c944d68dffe67e2d03f86ccef6304504.exe 28 PID 1168 wrote to memory of 2708 1168 c944d68dffe67e2d03f86ccef6304504.exe 28 PID 1168 wrote to memory of 2708 1168 c944d68dffe67e2d03f86ccef6304504.exe 28 PID 1168 wrote to memory of 2708 1168 c944d68dffe67e2d03f86ccef6304504.exe 28 PID 1168 wrote to memory of 2372 1168 c944d68dffe67e2d03f86ccef6304504.exe 30 PID 1168 wrote to memory of 2372 1168 c944d68dffe67e2d03f86ccef6304504.exe 30 PID 1168 wrote to memory of 2372 1168 c944d68dffe67e2d03f86ccef6304504.exe 30 PID 1168 wrote to memory of 2372 1168 c944d68dffe67e2d03f86ccef6304504.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exe"C:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exeC:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exeC:\Users\Admin\AppData\Local\Temp\c944d68dffe67e2d03f86ccef6304504.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d1d3ef67c7be29ae5f0cbf75a827deaf
SHA10e316918928c697548688edb595bfb4ccdb74989
SHA256fdcd330f6cf14caab381933d2827cfb09aa9bc3d300af796843894d85d6b4893
SHA5120cce8d919e32d61f6973396978c2f217c00a3838ba9b2a10b6cca0ff6cf32c6375059bcfd86f53aeaf47118aef43e02e6631be272688b991ba45be25d20f2c89
-
Filesize
1KB
MD56a8dab205bc81e7f3aefe4a38a1c9624
SHA16c5b0d894f9f01aa651d0cf4d0f7b3da71a8f7ea
SHA25649720c421bb3f14172723d829daab05f27ba980c202e988d591adf6cc462c981
SHA512556e0a1944ae6abfbb4fdf2d407f79776588e001e17b774aad9c24d65c751584913e209c8e7ab3b0ab45cf7abe22fecd2c7cd12b2095ce0003e25070b884833e
-
Filesize
600B
MD57a4cc5de5e14c2b3d90f6d7460ace385
SHA104dad15b65028894ce4af0b2d34b9b9d5721351c
SHA2561cc3851ed16eeba222e8a93615ac2c8d2c8bbd74743254e620217f8dc0c29aa2
SHA512b685f614713f9bb1ff49512777cd3f296e8c453204307121534506e3f0de59ab578235fa7f4f3db1f11fb7206bab33a5fbd21e4280d00d31c092c9e1b8afa191
-
Filesize
996B
MD50b3fbde62d7cd37a05e355b9b60a0a36
SHA14b65525889d596c33c25eaf595d2de5e489e0f30
SHA256513648e9047a1f3d59ce340969f68903e91e6592ceb69eff9c9de6405e2e2350
SHA51290b81830ad2c90edcda728562d836bf25de90a215eb79341906ecfac061ec3d4bf77ebaaa61295c81adcf180faaf7153151bfebab6c4ae558bc8f1ddc5cbc8be