Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe
Resource
win7-20240220-en
General
-
Target
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe
-
Size
880KB
-
MD5
eb0309e8c3246307635d24d035322895
-
SHA1
9bdea3ab3b6ea567997de2d9ad37d5dbe5cd863e
-
SHA256
975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614
-
SHA512
ae078b8be43e53018f0a60151fd67b5ecfd756660eb4f2d31f09b41a6e45967956c781b187f9c86c86edf201d195799a70880f5ad9fc3acc5b61a6cfc8052762
-
SSDEEP
24576:HAHnh+eWsN3skA4RV1Hom2KXMmHapKy5:6h+ZkldoPK8Yap/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\w: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\m: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\p: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\h: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\l: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\n: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\s: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\t: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\y: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\b: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\g: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\k: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\u: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\v: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\z: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\a: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\e: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\o: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\q: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\x: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\i: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe File opened (read-only) \??\j: 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2928 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 28 PID 2860 wrote to memory of 2928 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 28 PID 2860 wrote to memory of 2928 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 28 PID 2860 wrote to memory of 2928 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 28 PID 2860 wrote to memory of 2900 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 30 PID 2860 wrote to memory of 2900 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 30 PID 2860 wrote to memory of 2900 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 30 PID 2860 wrote to memory of 2900 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 30 PID 2860 wrote to memory of 3060 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 32 PID 2860 wrote to memory of 3060 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 32 PID 2860 wrote to memory of 3060 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 32 PID 2860 wrote to memory of 3060 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 32 PID 2860 wrote to memory of 2540 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 34 PID 2860 wrote to memory of 2540 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 34 PID 2860 wrote to memory of 2540 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 34 PID 2860 wrote to memory of 2540 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 34 PID 2860 wrote to memory of 2676 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 36 PID 2860 wrote to memory of 2676 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 36 PID 2860 wrote to memory of 2676 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 36 PID 2860 wrote to memory of 2676 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 36 PID 2860 wrote to memory of 2796 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 38 PID 2860 wrote to memory of 2796 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 38 PID 2860 wrote to memory of 2796 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 38 PID 2860 wrote to memory of 2796 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 38 PID 2860 wrote to memory of 2724 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 40 PID 2860 wrote to memory of 2724 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 40 PID 2860 wrote to memory of 2724 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 40 PID 2860 wrote to memory of 2724 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 40 PID 2860 wrote to memory of 2768 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 42 PID 2860 wrote to memory of 2768 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 42 PID 2860 wrote to memory of 2768 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 42 PID 2860 wrote to memory of 2768 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 42 PID 2860 wrote to memory of 2556 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 44 PID 2860 wrote to memory of 2556 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 44 PID 2860 wrote to memory of 2556 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 44 PID 2860 wrote to memory of 2556 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 44 PID 2860 wrote to memory of 2672 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 46 PID 2860 wrote to memory of 2672 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 46 PID 2860 wrote to memory of 2672 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 46 PID 2860 wrote to memory of 2672 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 46 PID 2860 wrote to memory of 2456 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 48 PID 2860 wrote to memory of 2456 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 48 PID 2860 wrote to memory of 2456 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 48 PID 2860 wrote to memory of 2456 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 48 PID 2860 wrote to memory of 2872 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 50 PID 2860 wrote to memory of 2872 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 50 PID 2860 wrote to memory of 2872 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 50 PID 2860 wrote to memory of 2872 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 50 PID 2860 wrote to memory of 2884 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 52 PID 2860 wrote to memory of 2884 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 52 PID 2860 wrote to memory of 2884 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 52 PID 2860 wrote to memory of 2884 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 52 PID 2860 wrote to memory of 1548 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 54 PID 2860 wrote to memory of 1548 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 54 PID 2860 wrote to memory of 1548 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 54 PID 2860 wrote to memory of 1548 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 54 PID 2860 wrote to memory of 2452 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 56 PID 2860 wrote to memory of 2452 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 56 PID 2860 wrote to memory of 2452 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 56 PID 2860 wrote to memory of 2452 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 56 PID 2860 wrote to memory of 2632 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 58 PID 2860 wrote to memory of 2632 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 58 PID 2860 wrote to memory of 2632 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 58 PID 2860 wrote to memory of 2632 2860 975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe"C:\Users\Admin\AppData\Local\Temp\975f9ce0769a079e99f06870122e9c4d394dfd51a6020818feeef9ccdb8b0614.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:2676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:2724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:2884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:356
-