Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe
Resource
win7-20240221-en
General
-
Target
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe
-
Size
4.9MB
-
MD5
3640ff45519f1acc1505348010626b6d
-
SHA1
d5b85fddbf7c893e50560da787d7bc0dcef658e9
-
SHA256
4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020
-
SHA512
6b407e7bfd9bdc7b4ab99b25ff810e547e38e29441b9e9fc224450d71a352789683b7096747daa98c114b65153c80fa857c538461a951432d9c20392b2c18486
-
SSDEEP
98304:D2X7i8AE3yWw+0wHhuEpvzmA9CQn4RNUBo003+RVIajg5I85CQJ:Y35yA9C/t0E+RKXI8P
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: AppLaunch.exe File opened (read-only) \??\p: AppLaunch.exe File opened (read-only) \??\w: AppLaunch.exe File opened (read-only) \??\x: AppLaunch.exe File opened (read-only) \??\e: AppLaunch.exe File opened (read-only) \??\l: AppLaunch.exe File opened (read-only) \??\k: AppLaunch.exe File opened (read-only) \??\m: AppLaunch.exe File opened (read-only) \??\o: AppLaunch.exe File opened (read-only) \??\t: AppLaunch.exe File opened (read-only) \??\u: AppLaunch.exe File opened (read-only) \??\y: AppLaunch.exe File opened (read-only) \??\a: AppLaunch.exe File opened (read-only) \??\i: AppLaunch.exe File opened (read-only) \??\z: AppLaunch.exe File opened (read-only) \??\s: AppLaunch.exe File opened (read-only) \??\g: AppLaunch.exe File opened (read-only) \??\j: AppLaunch.exe File opened (read-only) \??\q: AppLaunch.exe File opened (read-only) \??\r: AppLaunch.exe File opened (read-only) \??\v: AppLaunch.exe File opened (read-only) \??\b: AppLaunch.exe File opened (read-only) \??\h: AppLaunch.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4564-74-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-81-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-82-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-84-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-93-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-92-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-100-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-111-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-110-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-114-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-119-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-122-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4564-126-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4256 set thread context of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 216 4256 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 PID 4256 wrote to memory of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 PID 4256 wrote to memory of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 PID 4256 wrote to memory of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 PID 4256 wrote to memory of 4564 4256 4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe 88 PID 4564 wrote to memory of 4416 4564 AppLaunch.exe 92 PID 4564 wrote to memory of 4416 4564 AppLaunch.exe 92 PID 4564 wrote to memory of 4416 4564 AppLaunch.exe 92 PID 4564 wrote to memory of 3192 4564 AppLaunch.exe 94 PID 4564 wrote to memory of 3192 4564 AppLaunch.exe 94 PID 4564 wrote to memory of 3192 4564 AppLaunch.exe 94 PID 4564 wrote to memory of 2748 4564 AppLaunch.exe 96 PID 4564 wrote to memory of 2748 4564 AppLaunch.exe 96 PID 4564 wrote to memory of 2748 4564 AppLaunch.exe 96 PID 4564 wrote to memory of 3948 4564 AppLaunch.exe 98 PID 4564 wrote to memory of 3948 4564 AppLaunch.exe 98 PID 4564 wrote to memory of 3948 4564 AppLaunch.exe 98 PID 4564 wrote to memory of 2964 4564 AppLaunch.exe 100 PID 4564 wrote to memory of 2964 4564 AppLaunch.exe 100 PID 4564 wrote to memory of 2964 4564 AppLaunch.exe 100 PID 4564 wrote to memory of 4588 4564 AppLaunch.exe 102 PID 4564 wrote to memory of 4588 4564 AppLaunch.exe 102 PID 4564 wrote to memory of 4588 4564 AppLaunch.exe 102 PID 4564 wrote to memory of 1256 4564 AppLaunch.exe 106 PID 4564 wrote to memory of 1256 4564 AppLaunch.exe 106 PID 4564 wrote to memory of 1256 4564 AppLaunch.exe 106 PID 4564 wrote to memory of 4240 4564 AppLaunch.exe 108 PID 4564 wrote to memory of 4240 4564 AppLaunch.exe 108 PID 4564 wrote to memory of 4240 4564 AppLaunch.exe 108 PID 4564 wrote to memory of 2816 4564 AppLaunch.exe 111 PID 4564 wrote to memory of 2816 4564 AppLaunch.exe 111 PID 4564 wrote to memory of 2816 4564 AppLaunch.exe 111 PID 4564 wrote to memory of 3324 4564 AppLaunch.exe 114 PID 4564 wrote to memory of 3324 4564 AppLaunch.exe 114 PID 4564 wrote to memory of 3324 4564 AppLaunch.exe 114 PID 4564 wrote to memory of 744 4564 AppLaunch.exe 116 PID 4564 wrote to memory of 744 4564 AppLaunch.exe 116 PID 4564 wrote to memory of 744 4564 AppLaunch.exe 116 PID 4564 wrote to memory of 3248 4564 AppLaunch.exe 118 PID 4564 wrote to memory of 3248 4564 AppLaunch.exe 118 PID 4564 wrote to memory of 3248 4564 AppLaunch.exe 118 PID 4564 wrote to memory of 2668 4564 AppLaunch.exe 120 PID 4564 wrote to memory of 2668 4564 AppLaunch.exe 120 PID 4564 wrote to memory of 2668 4564 AppLaunch.exe 120 PID 4564 wrote to memory of 3756 4564 AppLaunch.exe 122 PID 4564 wrote to memory of 3756 4564 AppLaunch.exe 122 PID 4564 wrote to memory of 3756 4564 AppLaunch.exe 122 PID 4564 wrote to memory of 2200 4564 AppLaunch.exe 124 PID 4564 wrote to memory of 2200 4564 AppLaunch.exe 124 PID 4564 wrote to memory of 2200 4564 AppLaunch.exe 124 PID 4564 wrote to memory of 452 4564 AppLaunch.exe 127 PID 4564 wrote to memory of 452 4564 AppLaunch.exe 127 PID 4564 wrote to memory of 452 4564 AppLaunch.exe 127 PID 4564 wrote to memory of 4712 4564 AppLaunch.exe 129 PID 4564 wrote to memory of 4712 4564 AppLaunch.exe 129 PID 4564 wrote to memory of 4712 4564 AppLaunch.exe 129 PID 4564 wrote to memory of 3356 4564 AppLaunch.exe 131 PID 4564 wrote to memory of 3356 4564 AppLaunch.exe 131 PID 4564 wrote to memory of 3356 4564 AppLaunch.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe"C:\Users\Admin\AppData\Local\Temp\4ee84419fb9267081480954f1be176095a45fe299078dfa95f980e513b46a020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:4416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:3192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:3948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:4240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:3248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:3756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:2200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:4712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:3356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 4442⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4256 -ip 42561⤵PID:3260