Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 19:02
Behavioral task
behavioral1
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
Resource
win11-20240221-en
General
-
Target
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe
-
Size
94KB
-
MD5
93fd11cf69ac4f2b596f4e51a561b7b0
-
SHA1
077e1d02b17f023a13e64b43d9b19764705e3e8d
-
SHA256
ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
-
SHA512
4d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372
-
SSDEEP
1536:QNDrcwsIe38pzMX4Zm3QVd4lrYKIgInPv2Pvl/XNas2fRBW5nrJrc:QNDrpArCcQVd46bnPvuozrW5nrJo
Malware Config
Signatures
-
Detects Lobshot family 1 IoCs
resource yara_rule behavioral1/files/0x000400000001e5eb-2.dat family_lobshot -
Executes dropped EXE 1 IoCs
pid Process 2404 cb4180a5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\735f4e42 = "C:\\ProgramData\\cb4180a5.exe" cb4180a5.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1816 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4552 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 4552 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 2404 cb4180a5.exe 2404 cb4180a5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4552 wrote to memory of 2144 4552 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 87 PID 4552 wrote to memory of 2144 4552 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 87 PID 4552 wrote to memory of 2144 4552 ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe 87 PID 2144 wrote to memory of 1816 2144 cmd.exe 89 PID 2144 wrote to memory of 1816 2144 cmd.exe 89 PID 2144 wrote to memory of 1816 2144 cmd.exe 89 PID 2144 wrote to memory of 2404 2144 cmd.exe 99 PID 2144 wrote to memory of 2404 2144 cmd.exe 99 PID 2144 wrote to memory of 2404 2144 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping -n 10 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b.exe") & (start "" "C:\ProgramData\cb4180a5.exe")2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.0.0.13⤵
- Runs ping.exe
PID:1816
-
-
C:\ProgramData\cb4180a5.exe"C:\ProgramData\cb4180a5.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD593fd11cf69ac4f2b596f4e51a561b7b0
SHA1077e1d02b17f023a13e64b43d9b19764705e3e8d
SHA256ae221670729038f92398b7fe4e08928ea6ebc0c1d006c63c8a3bac2e30770c2b
SHA5124d870ba8af1617982c5f0e9cbd2da6fa5b0f109b8cd9ef2e6f7fcefacd4e44a13a018e2d1733798e59d2bbe62d337c121eef3408efb315252eed729dd1cb6372