Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe
Resource
win7-20240221-en
General
-
Target
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe
-
Size
4.9MB
-
MD5
3640ff45519f1acc1505348010626b6d
-
SHA1
d5b85fddbf7c893e50560da787d7bc0dcef658e9
-
SHA256
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020
-
SHA512
6b407e7bfd9bdc7b4ab99b25ff810e547e38e29441b9e9fc224450d71a352789683b7096747daa98c114b65153c80fa857c538461a951432d9c20392b2c18486
-
SSDEEP
98304:D2X7i8AE3yWw+0wHhuEpvzmA9CQn4RNUBo003+RVIajg5I85CQJ:Y35yA9C/t0E+RKXI8P
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: AppLaunch.exe File opened (read-only) \??\a: AppLaunch.exe File opened (read-only) \??\n: AppLaunch.exe File opened (read-only) \??\z: AppLaunch.exe File opened (read-only) \??\t: AppLaunch.exe File opened (read-only) \??\u: AppLaunch.exe File opened (read-only) \??\i: AppLaunch.exe File opened (read-only) \??\m: AppLaunch.exe File opened (read-only) \??\o: AppLaunch.exe File opened (read-only) \??\y: AppLaunch.exe File opened (read-only) \??\e: AppLaunch.exe File opened (read-only) \??\h: AppLaunch.exe File opened (read-only) \??\j: AppLaunch.exe File opened (read-only) \??\k: AppLaunch.exe File opened (read-only) \??\l: AppLaunch.exe File opened (read-only) \??\p: AppLaunch.exe File opened (read-only) \??\q: AppLaunch.exe File opened (read-only) \??\r: AppLaunch.exe File opened (read-only) \??\b: AppLaunch.exe File opened (read-only) \??\g: AppLaunch.exe File opened (read-only) \??\w: AppLaunch.exe File opened (read-only) \??\s: AppLaunch.exe File opened (read-only) \??\v: AppLaunch.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2720-43-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-52-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-53-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-54-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-56-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-62-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/2720-72-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2168 wrote to memory of 2720 2168 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 28 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2404 2720 AppLaunch.exe 29 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 2528 2720 AppLaunch.exe 31 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 3012 2720 AppLaunch.exe 33 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2816 2720 AppLaunch.exe 35 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2992 2720 AppLaunch.exe 37 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2652 2720 AppLaunch.exe 39 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2180 2720 AppLaunch.exe 41 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43 PID 2720 wrote to memory of 2748 2720 AppLaunch.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe"C:\Users\Admin\AppData\Local\Temp\4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:3012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:2652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:2884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:1864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:2264
-
-