Analysis

  • max time kernel
    165s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 18:49

General

  • Target

    e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe

  • Size

    7.9MB

  • MD5

    15ada4e1464b3b335dcd53c7a5442b98

  • SHA1

    0096fcc5962493999f04cc18fcd0c480a0bfef82

  • SHA256

    e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1

  • SHA512

    5df7cb278b4832cd25d13c4582240373995cdd7e72b6af8445a3a319f2d7be72206b5cab30f0aac8562f1ae81e76d7da4e614ee2076ea70a5fef4b24f554a1ba

  • SSDEEP

    24576:JNFO4eYFAvUgRXUwsmKmsTUr+u90D5CD43v47UfrB51vFX091GTjAZw4aGvRHkK7:6q

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
    "C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
      C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
      2⤵
        PID:4428
      • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
        C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
        2⤵
          PID:1756
        • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
          C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
          2⤵
            PID:2172
          • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
            C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
            2⤵
              PID:5076
            • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
              C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
              2⤵
                PID:676
              • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                2⤵
                  PID:2600
                • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                  C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                  2⤵
                    PID:4000
                  • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                    C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                    2⤵
                      PID:4164
                    • C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                      C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4664
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\e918bb058ef4042a3e4f535ebaa8e5bc3dd6d3ff3c5f81e93b0f3f2915a098c1.exe"
                        3⤵
                          PID:1728
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3608 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:5076

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/4600-0-0x00000000004F0000-0x0000000000CCA000-memory.dmp

                              Filesize

                              7.9MB

                            • memory/4600-1-0x00007FFE5F0D0000-0x00007FFE5FB91000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4600-2-0x000000001CA20000-0x000000001CDFA000-memory.dmp

                              Filesize

                              3.9MB

                            • memory/4600-3-0x000000001CF90000-0x000000001CFA0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4600-4-0x000000001E3A0000-0x000000001E432000-memory.dmp

                              Filesize

                              584KB

                            • memory/4600-5-0x000000001CF20000-0x000000001CF42000-memory.dmp

                              Filesize

                              136KB

                            • memory/4600-12-0x00007FFE5F0D0000-0x00007FFE5FB91000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4664-8-0x0000000000400000-0x0000000000BDD000-memory.dmp

                              Filesize

                              7.9MB

                            • memory/4664-11-0x0000000000400000-0x0000000000BDD000-memory.dmp

                              Filesize

                              7.9MB

                            • memory/4664-15-0x0000000000400000-0x0000000000BDD000-memory.dmp

                              Filesize

                              7.9MB

                            • memory/4664-16-0x0000000000400000-0x0000000000BDD000-memory.dmp

                              Filesize

                              7.9MB