Analysis

  • max time kernel
    131s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 20:39

General

  • Target

    7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe

  • Size

    366KB

  • MD5

    0d0a77f9198a32e88b6886c35017fd8d

  • SHA1

    f05b29ca9aa85fac328e06b00e3090c0b5ac5048

  • SHA256

    7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330

  • SHA512

    5c362eaff6e0fce5dfd590233f1dcea0d05c2c8aa0677503532e5f75c10a2f9562433a73346aac03af83f447fb1424616dbafec25743495ad7e536715852b4ae

  • SSDEEP

    6144:9rTfUHeeSKOS9ccFKk3Y9t9YkhLQ1OsVS3SOcYPfY6a9UXxDu7:9n8yN0Mr8khLoOsVKSUa9b7

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 35 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
    "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3004
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
        "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Public\Microsoft Build\Isass.exe
          "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2500
          • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
            "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2124
            • C:\Users\Public\Microsoft Build\Isass.exe
              "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
                7⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2668
                • C:\Users\Public\Microsoft Build\Isass.exe
                  "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2412
                  • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                    "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
                    9⤵
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2556
                    • C:\Users\Public\Microsoft Build\Isass.exe
                      "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:2384
                      • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                        "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
                        11⤵
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:2424
                        • C:\Users\Public\Microsoft Build\Isass.exe
                          "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:1168
                          • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                            "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
                            13⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:2324
                            • C:\Users\Public\Microsoft Build\Isass.exe
                              "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1016
                              • C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe
                                "C:\Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe"
                                15⤵
                                • Executes dropped EXE
                                PID:940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Microsoft Build\Isass.exe

    Filesize

    211KB

    MD5

    1031e02808b3d0fecfb34770fc0bec66

    SHA1

    27a8a914f87fb142f4298d39402d0d146ccec0ff

    SHA256

    76ad1e996b62fbc8f4533a5d46b6b2011785bd4dfc79e130f02f81e4419f2ce5

    SHA512

    02b9c7e78ddb316153d828f8896af418eb965502fdfd9b08dad87b9c2dde1e17e5a4fec1b4a72639985b156647221466c361fc7edb4ed377af0a8b844a2ffea8

  • \Users\Admin\AppData\Local\Temp\7251cdba4da2ca6e2bdda383756fff76f8c485822f6a06127a3a305c3eba6330.exe

    Filesize

    97KB

    MD5

    542d1a85dfc9d47d2ce73c885aaf2b5e

    SHA1

    018f6821486d6381fd536265732ee954993b6646

    SHA256

    14a89eda72e385f76bf15a7c4fd539c48837cf5df444a16f28c5b94f29799550

    SHA512

    33791b1af030a52148b41d5fe76b241b73847429f21c25c8bf79d2165591aa5af9d873e8f7d6c22d2a74176339840a99c2d7f60520c32127962200ee33a93021

  • \Users\Public\Microsoft Build\Isass.exe

    Filesize

    45KB

    MD5

    32299109d762837cc49f0c49701fdda3

    SHA1

    c72c6671a4ff6f4ac9f6ef90ca99824147a5f271

    SHA256

    170bfc4b17fea937cac208e5eed69b4a6683aee50a2fc31f99b66b850dc718ef

    SHA512

    8b153aad5328bfb5df19f25885aa307805c7fbed1f7cf2752e8bf795d1aafc6ec709212f59d1c159768eb1a5c8fd9d6dd4f98c9343362b3d6958630c914e133b

  • memory/1016-56-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/1016-50-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1016-49-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/1168-64-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/1168-43-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2124-31-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2324-47-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2324-45-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/2384-63-0x00000000048D0000-0x0000000005B78000-memory.dmp

    Filesize

    18.7MB

  • memory/2384-39-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2384-44-0x00000000048D0000-0x0000000005B78000-memory.dmp

    Filesize

    18.7MB

  • memory/2412-35-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2424-41-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2492-30-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2492-60-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2500-25-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2556-62-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2556-38-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2604-24-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2668-61-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2668-33-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2876-10-0x00000000040B0000-0x0000000005358000-memory.dmp

    Filesize

    18.7MB

  • memory/2876-15-0x00000000040B0000-0x0000000005358000-memory.dmp

    Filesize

    18.7MB

  • memory/2876-14-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2876-8-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2920-59-0x0000000004B90000-0x0000000005E38000-memory.dmp

    Filesize

    18.7MB

  • memory/2920-19-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/2920-28-0x0000000004B90000-0x0000000005E38000-memory.dmp

    Filesize

    18.7MB

  • memory/2920-20-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/3004-68-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-76-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-57-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-16-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-67-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-58-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-72-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-17-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/3004-81-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-85-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-91-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-92-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-101-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-102-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-114-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB

  • memory/3004-115-0x0000000000400000-0x00000000016A8000-memory.dmp

    Filesize

    18.7MB