Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe
Resource
win7-20240221-en
General
-
Target
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe
-
Size
563KB
-
MD5
f6ce89bf34e3ff6509a32347c400ca8d
-
SHA1
c4da78729b0e12c30c55036b1df7093ccd0ef719
-
SHA256
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4
-
SHA512
02eaec42b422eded7b669caa4018983dd1aa5a7795e4a88ede5821920c5be91f69940a06c35a211315e809c4b29674a574922f249d5a0cc11f332462cba7ff5b
-
SSDEEP
12288:9X2AHrixB7BziTfP5/BVHxuISKfAQslKsWg+IOefuqK/9EU5QgD3:9IzNwfR/BVHgInfA3A049Eix
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exedescription ioc Process File opened (read-only) \??\a: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\b: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\e: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\i: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\l: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\m: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\n: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\q: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\r: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\s: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\g: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\h: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\w: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\k: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\t: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\v: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\x: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\y: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\j: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\o: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\p: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\u: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe File opened (read-only) \??\z: 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe -
AutoIT Executable 21 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2824-9-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-10-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-12-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-15-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-25-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-29-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-33-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-34-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-37-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-41-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-45-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-49-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-50-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-54-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-53-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-65-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-69-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-74-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-73-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/2824-83-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exedescription pid Process procid_target PID 1776 set thread context of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exedescription pid Process Token: SeDebugPrivilege 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exedescription pid Process procid_target PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 1776 wrote to memory of 2824 1776 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 96 PID 2824 wrote to memory of 3624 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 97 PID 2824 wrote to memory of 3624 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 97 PID 2824 wrote to memory of 3624 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 97 PID 2824 wrote to memory of 4396 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 99 PID 2824 wrote to memory of 4396 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 99 PID 2824 wrote to memory of 4396 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 99 PID 2824 wrote to memory of 2108 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 101 PID 2824 wrote to memory of 2108 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 101 PID 2824 wrote to memory of 2108 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 101 PID 2824 wrote to memory of 872 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 103 PID 2824 wrote to memory of 872 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 103 PID 2824 wrote to memory of 872 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 103 PID 2824 wrote to memory of 2068 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 105 PID 2824 wrote to memory of 2068 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 105 PID 2824 wrote to memory of 2068 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 105 PID 2824 wrote to memory of 3236 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 107 PID 2824 wrote to memory of 3236 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 107 PID 2824 wrote to memory of 3236 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 107 PID 2824 wrote to memory of 4984 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 109 PID 2824 wrote to memory of 4984 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 109 PID 2824 wrote to memory of 4984 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 109 PID 2824 wrote to memory of 1244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 111 PID 2824 wrote to memory of 1244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 111 PID 2824 wrote to memory of 1244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 111 PID 2824 wrote to memory of 4584 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 113 PID 2824 wrote to memory of 4584 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 113 PID 2824 wrote to memory of 4584 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 113 PID 2824 wrote to memory of 2356 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 115 PID 2824 wrote to memory of 2356 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 115 PID 2824 wrote to memory of 2356 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 115 PID 2824 wrote to memory of 4416 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 117 PID 2824 wrote to memory of 4416 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 117 PID 2824 wrote to memory of 4416 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 117 PID 2824 wrote to memory of 920 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 119 PID 2824 wrote to memory of 920 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 119 PID 2824 wrote to memory of 920 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 119 PID 2824 wrote to memory of 3620 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 121 PID 2824 wrote to memory of 3620 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 121 PID 2824 wrote to memory of 3620 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 121 PID 2824 wrote to memory of 2020 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 123 PID 2824 wrote to memory of 2020 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 123 PID 2824 wrote to memory of 2020 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 123 PID 2824 wrote to memory of 3244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 125 PID 2824 wrote to memory of 3244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 125 PID 2824 wrote to memory of 3244 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 125 PID 2824 wrote to memory of 2752 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 127 PID 2824 wrote to memory of 2752 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 127 PID 2824 wrote to memory of 2752 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 127 PID 2824 wrote to memory of 4260 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 129 PID 2824 wrote to memory of 4260 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 129 PID 2824 wrote to memory of 4260 2824 8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe"C:\Users\Admin\AppData\Local\Temp\8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exeC:\Users\Admin\AppData\Local\Temp\8ab3879ed4b1601feb0de11637c9c4d1baeb5266f399d822f565299e5c1cd0c4.exe2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:3236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:4984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:1244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:4416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:3620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:3244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:4260
-
-