Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe
Resource
win7-20240221-en
General
-
Target
cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe
-
Size
598KB
-
MD5
e0ca9d7fdf345af474332533ee50dfb6
-
SHA1
303f5df8841a33886413435a61809d338a66639b
-
SHA256
cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1
-
SHA512
93d04456ca2915ed7cbfe8058b4283198cd9851e73dd4d2e2271889be622c3aa498506cb7ceef63d0eb1243d9987373fe47f0f579e96c03a6a3e5f5321f9d616
-
SSDEEP
12288:jN2vXjWMzp7E9Yy+PIPx2TQ1RABd89XBJm3QXNOZJxRYE601YlPmOU8L:jgrh7E6r5Q7AaJBo3QXerYfe0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\t: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\w: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\y: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\j: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\b: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\e: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\i: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\l: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\n: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\u: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\x: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\a: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\h: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\m: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\q: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\s: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\z: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\g: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\p: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\r: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\v: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe File opened (read-only) \??\k: cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe -
AutoIT Executable 21 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1552-9-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-11-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-12-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-15-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-21-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-29-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-33-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-34-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-37-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-41-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-45-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-49-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-50-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-53-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-57-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-66-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-65-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-69-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-73-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/1552-87-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 424 set thread context of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 424 wrote to memory of 1552 424 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 91 PID 1552 wrote to memory of 4488 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 92 PID 1552 wrote to memory of 4488 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 92 PID 1552 wrote to memory of 4488 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 92 PID 1552 wrote to memory of 1144 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 94 PID 1552 wrote to memory of 1144 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 94 PID 1552 wrote to memory of 1144 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 94 PID 1552 wrote to memory of 1976 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 96 PID 1552 wrote to memory of 1976 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 96 PID 1552 wrote to memory of 1976 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 96 PID 1552 wrote to memory of 560 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 98 PID 1552 wrote to memory of 560 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 98 PID 1552 wrote to memory of 560 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 98 PID 1552 wrote to memory of 1440 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 100 PID 1552 wrote to memory of 1440 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 100 PID 1552 wrote to memory of 1440 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 100 PID 1552 wrote to memory of 432 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 102 PID 1552 wrote to memory of 432 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 102 PID 1552 wrote to memory of 432 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 102 PID 1552 wrote to memory of 1928 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 104 PID 1552 wrote to memory of 1928 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 104 PID 1552 wrote to memory of 1928 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 104 PID 1552 wrote to memory of 4104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 106 PID 1552 wrote to memory of 4104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 106 PID 1552 wrote to memory of 4104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 106 PID 1552 wrote to memory of 4060 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 108 PID 1552 wrote to memory of 4060 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 108 PID 1552 wrote to memory of 4060 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 108 PID 1552 wrote to memory of 1104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 110 PID 1552 wrote to memory of 1104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 110 PID 1552 wrote to memory of 1104 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 110 PID 1552 wrote to memory of 3340 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 112 PID 1552 wrote to memory of 3340 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 112 PID 1552 wrote to memory of 3340 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 112 PID 1552 wrote to memory of 4748 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 114 PID 1552 wrote to memory of 4748 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 114 PID 1552 wrote to memory of 4748 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 114 PID 1552 wrote to memory of 4480 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 116 PID 1552 wrote to memory of 4480 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 116 PID 1552 wrote to memory of 4480 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 116 PID 1552 wrote to memory of 2184 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 118 PID 1552 wrote to memory of 2184 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 118 PID 1552 wrote to memory of 2184 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 118 PID 1552 wrote to memory of 1176 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 120 PID 1552 wrote to memory of 1176 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 120 PID 1552 wrote to memory of 1176 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 120 PID 1552 wrote to memory of 4196 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 122 PID 1552 wrote to memory of 4196 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 122 PID 1552 wrote to memory of 4196 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 122 PID 1552 wrote to memory of 852 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 124 PID 1552 wrote to memory of 852 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 124 PID 1552 wrote to memory of 852 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 124 PID 1552 wrote to memory of 4604 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 126 PID 1552 wrote to memory of 4604 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 126 PID 1552 wrote to memory of 4604 1552 cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe"C:\Users\Admin\AppData\Local\Temp\cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exeC:\Users\Admin\AppData\Local\Temp\cb4a93864a19fc14c1e5221912f8e7f409b5b8d835f1b3acc3712b80e4a909f1.exe2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:4488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:1144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:4104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:4060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:1104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:3340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:4748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:4480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:4604
-
-