Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe
Resource
win7-20240221-en
General
-
Target
df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe
-
Size
710KB
-
MD5
b8cd8b40bda5bec1e8d5b765b5a90db4
-
SHA1
41057c8497d0845fd54771d0e23ca234af9b3b2c
-
SHA256
df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3
-
SHA512
142347781d4f3b809d0e6331f38507e547031c4e7f984a4c3f4384273f6718f841fb481d7312c990846b89f0fa5f9d68c6231e0243b222c51015e138e59d9085
-
SSDEEP
12288:mwr2yHL6YwYXFRXO0vxrnUnevKJx7oNd+mj771U4Zo8y0kVTo4qLhyCNcDAt:RHL6YwYX7pxrnUV3kNd+i729To4q7C2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exedescription ioc process File opened (read-only) \??\t: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\y: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\i: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\k: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\l: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\o: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\r: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\h: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\s: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\u: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\v: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\w: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\z: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\a: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\e: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\g: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\n: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\q: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\b: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\j: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\m: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\p: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe File opened (read-only) \??\x: df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/3024-2-0x00000000004F0000-0x00000000005CD000-memory.dmp autoit_exe behavioral1/memory/3024-3-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-4-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-7-0x00000000004F0000-0x00000000005CD000-memory.dmp autoit_exe behavioral1/memory/3024-8-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-10-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-12-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-17-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral1/memory/3024-19-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exedescription pid process target process PID 3024 wrote to memory of 2980 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2980 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2980 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2980 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2992 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2992 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2992 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2992 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2596 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2596 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2596 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2596 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2832 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2832 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2832 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2832 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1500 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1500 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1500 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1500 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1884 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1884 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1884 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1884 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2316 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2316 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2316 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2316 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2928 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2928 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2928 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2928 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2452 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2452 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2452 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2452 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2908 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2908 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2908 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2908 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2280 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2280 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2280 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2280 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2308 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2308 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2308 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2308 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 564 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 564 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 564 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 564 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1356 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1356 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1356 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1356 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1476 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1476 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1476 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 1476 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2640 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2640 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2640 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe PID 3024 wrote to memory of 2640 3024 df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe"C:\Users\Admin\AppData\Local\Temp\df3b1ad5445d628c24c1308aa6cb476bd9a06f0095a2b285927964339866b2c3.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A2⤵PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A2⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A2⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A2⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A2⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A2⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A2⤵PID:2908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A2⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A2⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A2⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A2⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A2⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A2⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A2⤵PID:2728
-