Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
Resource
win10v2004-20240226-en
General
-
Target
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
-
Size
14.5MB
-
MD5
1dba954b14bc941c13917462e368c560
-
SHA1
ab9eaf52b10a9d270ba0776087456f55ca10c447
-
SHA256
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396
-
SHA512
e952f7d9fdfc63233ed2592251c68d6bb631b80d586a8349731f858e8c4dca266a91c4db2a042df2accdab30044d3f4b5a3517d0ec1f130080609007ef268167
-
SSDEEP
12288:Mi2f75WQGH5Tua5O7g8+V9rI0djHf1lwNfUNq71j8/37vXu:V8YZO2j3I0dP7P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 1D11H0.exe -
Loads dropped DLL 5 IoCs
pid Process 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 2336 WerFault.exe 2336 WerFault.exe 2336 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2336 1716 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 1D11H0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 1D11H0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1716 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 28 PID 2352 wrote to memory of 1716 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 28 PID 2352 wrote to memory of 1716 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 28 PID 2352 wrote to memory of 1716 2352 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 28 PID 1716 wrote to memory of 2336 1716 1D11H0.exe 31 PID 1716 wrote to memory of 2336 1716 1D11H0.exe 31 PID 1716 wrote to memory of 2336 1716 1D11H0.exe 31 PID 1716 wrote to memory of 2336 1716 1D11H0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe"C:\Users\Admin\AppData\Local\Temp\5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\ProgramData\1D11H0.exe"C:\ProgramData\1D11H0.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 6323⤵
- Loads dropped DLL
- Program crash
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD51a9fa43be1579005d913413d18f047b7
SHA1a92faa80014713989cd2c527d0bc7dd0991d90a4
SHA25630a9559298fd9d27a75bd6b5a73b762ac997992f677a0081d7fb87b74c00eff1
SHA512e52d2f06d9a424e0ded2943e43d07e8ac40ee85f8cb10c90d88abf7482046f38c2d8580055cf211094f1274c930061c889480ffade363cf1b6eee57def259dbd