Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe
Resource
win7-20240221-en
General
-
Target
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe
-
Size
666KB
-
MD5
75d6f57cfba0ebc3633a49a8412a43e5
-
SHA1
dd7a31b07f1dfdcdbb72f59c3535636b41d0eaad
-
SHA256
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b
-
SHA512
f0af86544c32c48480435cd7be758892e747989189d30952bbe0bdc59074fcdab2e4022ec20125275846713c65710d3249268a76eb89009cd9cd036c83ed043c
-
SSDEEP
12288:OGJvgsbgbyf6lzps3Lo4CwKj/X+3WxeOW93pSsTAvSBubsKxl8q/Npiv2cH3:OGWpSYs3c4CwKjW5OW94sTA/Jov2cH3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exedescription ioc process File opened (read-only) \??\b: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\h: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\n: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\t: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\u: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\z: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\x: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\y: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\a: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\i: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\j: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\o: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\p: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\r: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\e: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\g: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\k: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\l: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\w: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\m: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\q: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\s: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\v: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2400-2-0x0000000000230000-0x000000000030D000-memory.dmp autoit_exe behavioral1/memory/2400-3-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-4-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-7-0x0000000000230000-0x000000000030D000-memory.dmp autoit_exe behavioral1/memory/2400-8-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-10-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-12-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-14-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-16-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral1/memory/2400-18-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exedescription pid process target process PID 2400 wrote to memory of 2332 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2332 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2332 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2332 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2028 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2028 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2028 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2028 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2576 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2576 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2576 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2576 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2700 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2700 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2700 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2700 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2596 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2596 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2596 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2596 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2588 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2588 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2588 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2588 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 552 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 552 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 552 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 552 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2712 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2712 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2712 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2712 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2500 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2500 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2500 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2500 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2964 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2964 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2964 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2964 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1732 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1732 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1732 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1732 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1180 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1180 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1180 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1180 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2868 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2868 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2868 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2868 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2096 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2096 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2096 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2096 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2144 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2144 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2144 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 2144 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1428 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1428 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1428 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe PID 2400 wrote to memory of 1428 2400 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe"C:\Users\Admin\AppData\Local\Temp\2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:2332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:1180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:2868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:1176
-