Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
Resource
win10v2004-20240508-en
General
-
Target
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
-
Size
614KB
-
MD5
57f9d870b05d59a7e79816ef5e8fe70e
-
SHA1
e5f2d86139d9a847663b2cd0c68716e85678177d
-
SHA256
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e
-
SHA512
9dc3849575caa0337645f7f24d4d7720375857875a26dad839512de6aa3dc2d49f7bbf2138c7c09aa94e37ce94b0f1f370eafca3bc89faba46bd13b1073f40c2
-
SSDEEP
12288:6jLIHe+qdOqQ/H6OKnA5feEq8sdvuxi+vC/tKJ+2BAMSsjgZeS1I/XUta93poy:CRtwtvagbCy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2164 D5HYAA6YQ9.exe -
Loads dropped DLL 5 IoCs
pid Process 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 2164 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 28 PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 28 PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 28 PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 28 PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe 30 PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe 30 PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe 30 PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe"C:\Users\Admin\AppData\Local\Temp\02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\ProgramData\D5HYAA6YQ9.exe"C:\ProgramData\D5HYAA6YQ9.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 8083⤵
- Loads dropped DLL
- Program crash
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD514878fb96760ba869271109d832f43a7
SHA1874f6bcac3ef5682a567483ea5627d38bfbffa8d
SHA2560c816842e7a1649f0010b7c437a7783f82fd8a62a080adaeaecd871e6578c721
SHA512f882cfb373f79e823e3284b6dbe09d7df0ea90d0ab20e9399e1ee3af86eec2e8ba5c3b882f6b7f88b0478bc3fdfe05e033ee6fcbc2813faf13558fbec1d0a2e2