Analysis
-
max time kernel
144s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe
Resource
win7-20240221-en
General
-
Target
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe
-
Size
666KB
-
MD5
75d6f57cfba0ebc3633a49a8412a43e5
-
SHA1
dd7a31b07f1dfdcdbb72f59c3535636b41d0eaad
-
SHA256
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b
-
SHA512
f0af86544c32c48480435cd7be758892e747989189d30952bbe0bdc59074fcdab2e4022ec20125275846713c65710d3249268a76eb89009cd9cd036c83ed043c
-
SSDEEP
12288:OGJvgsbgbyf6lzps3Lo4CwKj/X+3WxeOW93pSsTAvSBubsKxl8q/Npiv2cH3:OGWpSYs3c4CwKjW5OW94sTA/Jov2cH3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exedescription ioc Process File opened (read-only) \??\e: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\h: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\k: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\o: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\s: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\a: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\b: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\m: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\p: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\r: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\u: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\x: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\y: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\v: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\g: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\i: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\j: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\l: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\n: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\q: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\t: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\w: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe File opened (read-only) \??\z: 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1256-2-0x0000000000EE0000-0x0000000000FBD000-memory.dmp autoit_exe behavioral2/memory/1256-3-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-4-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-7-0x0000000000EE0000-0x0000000000FBD000-memory.dmp autoit_exe behavioral2/memory/1256-8-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-11-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-13-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-15-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-17-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe behavioral2/memory/1256-19-0x0000000000400000-0x0000000000A7E000-memory.dmp autoit_exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exedescription pid Process procid_target PID 1256 wrote to memory of 2892 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 87 PID 1256 wrote to memory of 2892 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 87 PID 1256 wrote to memory of 2892 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 87 PID 1256 wrote to memory of 5064 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 90 PID 1256 wrote to memory of 5064 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 90 PID 1256 wrote to memory of 5064 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 90 PID 1256 wrote to memory of 440 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 92 PID 1256 wrote to memory of 440 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 92 PID 1256 wrote to memory of 440 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 92 PID 1256 wrote to memory of 640 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 94 PID 1256 wrote to memory of 640 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 94 PID 1256 wrote to memory of 640 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 94 PID 1256 wrote to memory of 4872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 96 PID 1256 wrote to memory of 4872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 96 PID 1256 wrote to memory of 4872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 96 PID 1256 wrote to memory of 1164 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 98 PID 1256 wrote to memory of 1164 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 98 PID 1256 wrote to memory of 1164 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 98 PID 1256 wrote to memory of 4324 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 100 PID 1256 wrote to memory of 4324 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 100 PID 1256 wrote to memory of 4324 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 100 PID 1256 wrote to memory of 2208 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 102 PID 1256 wrote to memory of 2208 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 102 PID 1256 wrote to memory of 2208 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 102 PID 1256 wrote to memory of 4668 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 104 PID 1256 wrote to memory of 4668 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 104 PID 1256 wrote to memory of 4668 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 104 PID 1256 wrote to memory of 2584 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 106 PID 1256 wrote to memory of 2584 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 106 PID 1256 wrote to memory of 2584 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 106 PID 1256 wrote to memory of 5104 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 108 PID 1256 wrote to memory of 5104 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 108 PID 1256 wrote to memory of 5104 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 108 PID 1256 wrote to memory of 3452 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 110 PID 1256 wrote to memory of 3452 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 110 PID 1256 wrote to memory of 3452 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 110 PID 1256 wrote to memory of 5056 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 112 PID 1256 wrote to memory of 5056 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 112 PID 1256 wrote to memory of 5056 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 112 PID 1256 wrote to memory of 1940 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 114 PID 1256 wrote to memory of 1940 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 114 PID 1256 wrote to memory of 1940 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 114 PID 1256 wrote to memory of 872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 116 PID 1256 wrote to memory of 872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 116 PID 1256 wrote to memory of 872 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 116 PID 1256 wrote to memory of 1748 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 120 PID 1256 wrote to memory of 1748 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 120 PID 1256 wrote to memory of 1748 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 120 PID 1256 wrote to memory of 2544 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 122 PID 1256 wrote to memory of 2544 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 122 PID 1256 wrote to memory of 2544 1256 2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe"C:\Users\Admin\AppData\Local\Temp\2d9d61ce6c01329808db1ca466c1c5fbf405e4e869ed04c59f0e45d7ad12f25b.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:5064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:3452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:5056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:1748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:2544
-