Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
de069850c1f3a9781055a89106a171eb.exe
Resource
win7-20240319-en
General
-
Target
de069850c1f3a9781055a89106a171eb.exe
-
Size
841KB
-
MD5
de069850c1f3a9781055a89106a171eb
-
SHA1
e5ca37468e8000e2f2608459c35ebba2af038a03
-
SHA256
98d5142945eee6b8913defa708a7a4d128c179d1dd5924b154a47cd90ed89244
-
SHA512
07493910df95551c800250e54c570dc3d105688be9d8c8f40a61192e74da6e46ba3fad4163f6fee15e0c48c566a9a619b9d6ae2da36716baf08e62a630953bc7
-
SSDEEP
12288:ofaU66HJrHH2+p5r8mUrdM8COTpbR1eamQpHonbvlF9omcNLcklRI2wQuES3ov5b:qAYllr8lTXpHgPNJBq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 freegeoip.app 7 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
de069850c1f3a9781055a89106a171eb.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 de069850c1f3a9781055a89106a171eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier de069850c1f3a9781055a89106a171eb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
de069850c1f3a9781055a89106a171eb.exepid process 3288 de069850c1f3a9781055a89106a171eb.exe 3288 de069850c1f3a9781055a89106a171eb.exe 3288 de069850c1f3a9781055a89106a171eb.exe 3288 de069850c1f3a9781055a89106a171eb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
de069850c1f3a9781055a89106a171eb.exedescription pid process Token: SeDebugPrivilege 3288 de069850c1f3a9781055a89106a171eb.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f11e0268857086998f962fbaa9b24d84
SHA1516d40cd6cd577e247bb025f5289be7dd59740f5
SHA25644b901f2027c2e78c9b23c1a631d97c87ce013db9ea27207aaba7d2c25d9ac54
SHA512d43b0b164890ac9ff0e1b16409a8a896ef7561958defe9037f3f9fcf8c5b45b8c7b12f0d93c5f2d600e1443d4b9349aa40dd808122a2c72e4bd48317dd06c12c
-
Filesize
187B
MD50cfc0f71ad946c2236a414e0adba7a38
SHA1f9ef745ab88c7d7e7c552eb656940f90072e246b
SHA256a1833b49b1cbbb673eb71acb924f71458e0d85b4da2f0ba1aa280f3263ea7994
SHA512bdfb53fe14b9fea49cde9802cde997b3aa016c38cc68744043b4ea292fa01efcc57ecb3afd97fd80df47f9f35ec679c67ee665d0e3befcebaeaecdfbc487cc97
-
Filesize
738B
MD573fedd0e684e9455863bd55495a57927
SHA1a1ee2758e451c473a5e2bdfbf30c0d67fdcc0d80
SHA256324e105f0553f051a82babff89077a431adc629f36c319fd882988056e661d3e
SHA5128d6237bc1fe20f7318f080af9c767c9a0974e81d750f716ae27ed39c54d0ab2433d868d656df0a607b20354038c2a4755ecd62e5b5bdaf2fb2aed9b384447d0a
-
Filesize
1KB
MD532124443a0330546e211cc2399c2cb59
SHA159b6a4d7a00a3524a506bc2d4d46abd1f86cdce3
SHA25604d3e42b643bf81416d6c449af108eb3f2078206315a5625427bcf345b9d8378
SHA512a74148e557be0ae48fb8278237d5aff2f956d6cc1d969455bd11fe27866b8857bb0876e44a293627b04bb925abeeb92852bf19a2b8db25bea9ca12f6b5a8efc8