Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 08:44
Behavioral task
behavioral1
Sample
cd9d0b9cc0581dac3ce18bd717aee06a.exe
Resource
win7-20240221-en
General
-
Target
cd9d0b9cc0581dac3ce18bd717aee06a.exe
-
Size
6.6MB
-
MD5
cd9d0b9cc0581dac3ce18bd717aee06a
-
SHA1
2051c8577eb654bcbd4f332cec887d9df3964e58
-
SHA256
62cd051297b0947256fd2a2cb8055e8d19d3d0076bf8bcdf74c3040f68339d14
-
SHA512
6bdd20b3bb59f6ba2cb36ae684e91b1a38f7dc346195d71ef0784e4aa289297aa9a9fc4707da2fc5b25d7910363fb744c290b5a1bf86f419f91d8cfac8f5a378
-
SSDEEP
196608:k5PmCsXDjDyf6L2WliXYrHW1LS5Q0LSF:WPmCEDVL2ciIrHWRSW0e
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe 2464 cd9d0b9cc0581dac3ce18bd717aee06a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 19 pastebin.com 20 pastebin.com 21 discord.com 23 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org 8 api.ipify.org -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1020 wrote to memory of 2464 1020 cd9d0b9cc0581dac3ce18bd717aee06a.exe 91 PID 1020 wrote to memory of 2464 1020 cd9d0b9cc0581dac3ce18bd717aee06a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"C:\Users\Admin\AppData\Local\Temp\cd9d0b9cc0581dac3ce18bd717aee06a.exe"2⤵
- Loads dropped DLL
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD518049f6811fc0f94547189a9e104f5d2
SHA1dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6
SHA256c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db
SHA51238fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7
-
Filesize
84KB
MD5a991152fd5b8f2a0eb6c34582adf7111
SHA13589342abea22438e28aa0a0a86e2e96e08421a1
SHA2567301fc2447e7e6d599472d2c52116fbe318a9ff9259b8a85981c419bfd20e3ef
SHA512f039ac9473201d27882c0c11e5628a10bdbe5b4c9b78ead246fd53f09d25e74c984e9891fccbc27c63edc8846d5e70f765ca7b77847a45416675d2e7c04964fc
-
Filesize
124KB
MD57322f8245b5c8551d67c337c0dc247c9
SHA15f4cb918133daa86631211ae7fa65f26c23fcc98
SHA2564fcf4c9c98b75a07a7779c52e1f7dff715ae8a2f8a34574e9dac66243fb86763
SHA51252748b59ce5d488d2a4438548963eb0f2808447c563916e2917d08e5f4aab275e4769c02b63012b3d2606fdb5a8baa9eb5942ba5c5e11b7678f5f4187b82b0c2
-
Filesize
64KB
MD588e2bf0a590791891fb5125ffcf5a318
SHA139f96abbabf3fdd46844ba5190d2043fb8388696
SHA256e7aecb61a54dcc77b6d9cafe9a51fd1f8d78b2194cc3baf6304bbd1edfd0aee6
SHA5127d91d2fa95bb0ffe92730679b9a82e13a3a6b9906b2c7f69bc9065f636a20be65e1d6e7a557bfd6e4b80edd0f00db92eb7fea06345c2c9b98176c65d18c4bdbf
-
Filesize
159KB
MD5cdd13b537dad6a910cb9cbb932770dc9
SHA1b37706590d5b6f18c042119d616df6ff8ce3ad46
SHA256638cd8c336f90629a6260e67827833143939497d542838846f4fc94b2475bb3e
SHA512c375fb6914cda3ae7829d016d3084f3b5b9f78f200a62f076ec1646576f87694eec7fa6f1c99cbe30824f2fe6e2d61ecdeb50061383b12143cd2678004703199
-
Filesize
78KB
MD5478abd499eefeba3e50cfc4ff50ec49d
SHA1fe1aae16b411a9c349b0ac1e490236d4d55b95b2
SHA256fdb14859efee35e105f21a64f7afdf50c399ffa0fa8b7fcc76dae4b345d946cb
SHA512475b8d533599991b4b8bfd27464b379d78e51c41f497e81698b4e7e871f82b5f6b2bfec70ec2c0a1a8842611c8c2591133eaef3f7fc4bc7625e18fc4189c914e
-
Filesize
151KB
MD5cf7886b3ac590d2ea1a6efe4ee47dc20
SHA18157a0c614360162588f698a2b0a4efe321ea427
SHA2563d183c1b3a24d634387cce3835f58b8e1322bf96ab03f9fe9f02658fb17d1f8c
SHA512b171f7d683621fdab5989bfed20c3f6479037035f334ea9a19feb1184f46976095a7666170a06f1258c6ddf2c1f8bdb4e31cbfd33d3b8fa4b330f097d1c09d81
-
Filesize
763KB
MD5c6b38adf85add9f9a7ea0b67eea508b4
SHA123a398ffdae6047d9777919f7b6200dd2a132887
SHA25677479f65578cf9710981255a3ad5495d45f8367b2f43c2f0680fce0fed0e90fb
SHA512d6abc793a7b6cc6138b50305a8c1cad10fa1628ca01a2284d82222db9bd1569959b05bdf4581d433ff227438131e43eec98bf265e746b17e76b1c9e9e21d447d
-
Filesize
3.2MB
MD589511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
674KB
MD550bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
Filesize
2.3MB
MD554d1121445e30ec555f60a867016ef3e
SHA1456eac0391c4af34dbd23072cb3bd9b24a73d3a9
SHA2569cc484e776fbd97623aacbb56737f20e0620a7f4d0eb68444998273026a81f4c
SHA512ad310fa620041cf41f8d9f9228989c1e308a15fd5a293c0f1ffbb1942d380654f86a3d17ad5b691d2621b4bbd3a0ee0c80a65d2a8c70da1656dc49bee3c1a013
-
Filesize
896KB
MD5564cd2bd76afbb2ea18a9433b74b3bd8
SHA1c6ee3c979ce0405ac6b8f820f587d2731822f692
SHA256bd81dd26cc4c2698b8bff0f63d44729d5e9ae5537246768ae3539c0265da8e2b
SHA512305650c79936c53f3c25cbab76379a610f10982d54169d9e0a1cd62ff2ad2cd93b4ccfb1c589d85f3e76f29e7e6c377c4e1775a06c3ecc509e0aad4b05734b1c
-
Filesize
28KB
MD5fed3dae56f7c9ea35d2e896fede29581
SHA1ae5b2ef114138c4d8a6479d6441967c170c5aa23
SHA256d56542143775d02c70ad713ac36f295d473329ef3ad7a2999811d12151512931
SHA5123128c57724b0609cfcaca430568d79b0e6abd13e5bba25295493191532dba24af062d4e0340d0ed68a885c24fbbf36b7a3d650add2f47f7c2364eab6a0b5faff
-
Filesize
1.1MB
MD5cd12c15c6eef60d9ea058cd4092e5d1b
SHA157a7c0b0468f0be8e824561b45f86e0aa0db28dd
SHA256e3ab6e5749a64e04ee8547f71748303ba159dd68dfc402cb69356f35e645badd
SHA512514e76174f977cc73300bc40ff170007a444e743a39947d5e2f76e60b2a149c16d57b42b6a82a7fea8dd4e9addb3e876d8ab50ea1898ee896c1907667277cf00