Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe
Resource
win7-20240221-en
General
-
Target
b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe
-
Size
738KB
-
MD5
059c5bbec45da7e50d92a54160622d36
-
SHA1
a97230965dea34f32ac9db418aece125ceb63426
-
SHA256
b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423
-
SHA512
815f69af1f09a2de5d1ee323ef77d203985d516413ab482d635e48d012717b2d7bcac84127d0425a4a879a8e25079dff369482940d5a6bf1be0066fe5e08246b
-
SSDEEP
12288:4ywZ/z12SBEnKMY+7/Cw6nTcRu5sj1LjOJngWoBPrndO1fcWsfdNcG8zUx:4Z/zHsR76w6nTcRu5s1jXBznY101f+zm
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exedescription ioc process File opened (read-only) \??\a: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\h: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\i: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\j: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\s: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\g: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\k: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\m: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\p: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\t: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\u: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\w: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\l: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\o: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\q: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\r: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\x: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\z: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\b: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\e: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\n: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\v: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe File opened (read-only) \??\y: b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4012-2-0x0000000002120000-0x00000000021FD000-memory.dmp autoit_exe behavioral2/memory/4012-3-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-4-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-7-0x0000000002120000-0x00000000021FD000-memory.dmp autoit_exe behavioral2/memory/4012-8-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-10-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-12-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-17-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4012-19-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exedescription pid process target process PID 4012 wrote to memory of 2124 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2124 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2124 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2176 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2176 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2176 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2516 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2516 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2516 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4292 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4292 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4292 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4996 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4996 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4996 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 1676 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 1676 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 1676 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4772 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4772 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4772 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4160 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4160 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4160 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2408 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2408 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2408 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4580 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4580 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4580 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3112 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3112 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3112 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4332 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4332 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4332 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4452 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4452 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4452 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4604 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4604 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4604 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3012 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3012 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 3012 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2820 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2820 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 2820 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4476 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4476 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe PID 4012 wrote to memory of 4476 4012 b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe"C:\Users\Admin\AppData\Local\Temp\b83c41763b5e861e15614d3d6ab8573c7948bf176143ee4142516e9b8bcb4423.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:4160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:4580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:3112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:3012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:2820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:4476
-