Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe
Resource
win7-20240220-en
General
-
Target
39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe
-
Size
1.3MB
-
MD5
ee3895f50bbc6316a746c239afc47e71
-
SHA1
4aaf0acb7891fe06868ea442f55e5913961117d7
-
SHA256
39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b
-
SHA512
0a6e1fc864aa8b013c8a2585053ad7bf095226f4bc9966dd3605aac068df3fd9c409932c5e0b78f19dc64842f25b47339b1137b2fa83031f263a2be89e44f7a8
-
SSDEEP
12288:uduBqfIBpUXjWMzp7E9Yy+PIPx2TQ1RABd89XBJm3QXNOZJxRYE601YldgcMeAoG:uEkQB4h7E6r5Q7AaJBo3QXerYfdgBD
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\z: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\a: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\k: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\l: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\m: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\n: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\b: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\j: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\o: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\p: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\e: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\g: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\t: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\v: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\y: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\u: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\w: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\h: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\i: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\q: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\r: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe File opened (read-only) \??\s: 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe -
AutoIT Executable 23 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3652-11-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-12-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-16-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-17-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-19-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-23-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-27-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-31-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-32-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-35-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-39-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-43-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-47-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-51-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-52-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-55-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-59-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-63-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-67-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-68-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-71-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/3652-89-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3444 set thread context of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3076 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 102 PID 3444 wrote to memory of 3076 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 102 PID 3444 wrote to memory of 3076 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 102 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3444 wrote to memory of 3652 3444 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 103 PID 3652 wrote to memory of 3696 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 104 PID 3652 wrote to memory of 3696 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 104 PID 3652 wrote to memory of 3696 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 104 PID 3652 wrote to memory of 4732 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 107 PID 3652 wrote to memory of 4732 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 107 PID 3652 wrote to memory of 4732 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 107 PID 3652 wrote to memory of 2176 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 109 PID 3652 wrote to memory of 2176 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 109 PID 3652 wrote to memory of 2176 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 109 PID 3652 wrote to memory of 3620 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 111 PID 3652 wrote to memory of 3620 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 111 PID 3652 wrote to memory of 3620 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 111 PID 3652 wrote to memory of 2236 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 113 PID 3652 wrote to memory of 2236 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 113 PID 3652 wrote to memory of 2236 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 113 PID 3652 wrote to memory of 392 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 115 PID 3652 wrote to memory of 392 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 115 PID 3652 wrote to memory of 392 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 115 PID 3652 wrote to memory of 1812 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 117 PID 3652 wrote to memory of 1812 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 117 PID 3652 wrote to memory of 1812 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 117 PID 3652 wrote to memory of 4564 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 119 PID 3652 wrote to memory of 4564 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 119 PID 3652 wrote to memory of 4564 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 119 PID 3652 wrote to memory of 3456 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 121 PID 3652 wrote to memory of 3456 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 121 PID 3652 wrote to memory of 3456 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 121 PID 3652 wrote to memory of 4836 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 123 PID 3652 wrote to memory of 4836 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 123 PID 3652 wrote to memory of 4836 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 123 PID 3652 wrote to memory of 4420 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 125 PID 3652 wrote to memory of 4420 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 125 PID 3652 wrote to memory of 4420 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 125 PID 3652 wrote to memory of 1988 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 127 PID 3652 wrote to memory of 1988 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 127 PID 3652 wrote to memory of 1988 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 127 PID 3652 wrote to memory of 4384 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 129 PID 3652 wrote to memory of 4384 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 129 PID 3652 wrote to memory of 4384 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 129 PID 3652 wrote to memory of 4892 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 131 PID 3652 wrote to memory of 4892 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 131 PID 3652 wrote to memory of 4892 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 131 PID 3652 wrote to memory of 2548 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 133 PID 3652 wrote to memory of 2548 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 133 PID 3652 wrote to memory of 2548 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 133 PID 3652 wrote to memory of 3660 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 135 PID 3652 wrote to memory of 3660 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 135 PID 3652 wrote to memory of 3660 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 135 PID 3652 wrote to memory of 4100 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 137 PID 3652 wrote to memory of 4100 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 137 PID 3652 wrote to memory of 4100 3652 39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe"C:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exeC:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe2⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exeC:\Users\Admin\AppData\Local\Temp\39e8455d21447e32141dc064eb7504c6925f823bf6d9c8ce004d44cb8facc80b.exe2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:3696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:3620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:4564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:4836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:4384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:3660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:1612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:2604