Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 09:13

General

  • Target

    decdb0792dc19680eb2ae0b6c5a57f36.exe

  • Size

    571KB

  • MD5

    decdb0792dc19680eb2ae0b6c5a57f36

  • SHA1

    6a39fe6622fbc6647e8199038a42348b782db0ea

  • SHA256

    b70101421d4e552f3641bea7257496edae2e5b27eed082fbdd37ab0747f2ecc6

  • SHA512

    ac798e93eb002b4c9d7630aa3c63a7e30525e1e089e4e81d820d0b255375c02a9c9ffa092e8a541dc02f1d6144058b477348bf9403988a2a1c9a363f4ad09dc2

  • SSDEEP

    12288:N880N2Ymmt0LDXoNIzfday0rUjk5ymOcB+pwPprnv:N8RwoSz1ay0rUKLOsDFnv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\decdb0792dc19680eb2ae0b6c5a57f36.exe
    "C:\Users\Admin\AppData\Local\Temp\decdb0792dc19680eb2ae0b6c5a57f36.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\905c0769f9a06c95a24ddf945\patcher.exe

    Filesize

    1.1MB

    MD5

    0381483dc66d35d5e3a3624833a0ea33

    SHA1

    d822c94bdb4653c2a0ade2ace56d9452a5949af6

    SHA256

    0b9a7fc5d09451eb365463262be8cd702a3839d3c2917f02c2a4ecfc0b4e1dc9

    SHA512

    58912d8f4e06acb30acd421319495507d539f90d0fb56692a97a865a6c5343417d37adbfa40509ab33eb4ac56c82ff5e7f818ef7db62d35a208fc13cbb68245e

  • memory/2980-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2980-1-0x0000000000220000-0x0000000000223000-memory.dmp

    Filesize

    12KB

  • memory/2980-792-0x0000000000220000-0x0000000000223000-memory.dmp

    Filesize

    12KB