Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 01:52

General

  • Target

    b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe

  • Size

    3.1MB

  • MD5

    c25d83ca26d86d57064e521b5c052a4e

  • SHA1

    337c4c76ea115aa6a64ea0ef120e19801d5e8778

  • SHA256

    b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400

  • SHA512

    ed8c361a9fe46652b67c10c958fd96ac2fcfca78507d57db7448dc769f1fa846bdb2c5ab7ddfb574db6cc00f5e689c2545b84793cedc654298675a566782ffcf

  • SSDEEP

    49152:LoZNSyRRu6MuGHrKPQqWDE0xvGCMSUIp1fdB1bqI5GB9Z6RMMLTvvw/XOU0hijw:krS6Wu4Q0xvGheXZnYMRpTS6ij

Malware Config

Signatures

  • Detects executables packed with SmartAssembly 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe
    "C:\Users\Admin\AppData\Local\Temp\b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe
      "C:\Users\Admin\AppData\Local\Temp\b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b4766f951ea0bb8fac6165ccb2851839699c18b9c993f6dc67be39f1fef2b400.exe.log

          Filesize

          805B

          MD5

          58a9108e39c2ea50e65c23be3a9407cf

          SHA1

          fb21f7b9330aa1a77080a3243b81b49035102d7b

          SHA256

          6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

          SHA512

          93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

        • memory/1020-62-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-4887-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB

        • memory/1020-3-0x0000000006360000-0x00000000067EE000-memory.dmp

          Filesize

          4.6MB

        • memory/1020-4-0x00000000067F0000-0x0000000006A3A000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-60-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-6-0x0000000006AE0000-0x0000000006B72000-memory.dmp

          Filesize

          584KB

        • memory/1020-24-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-32-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-36-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-44-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-42-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-40-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-38-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-34-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-30-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-28-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-26-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-22-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-20-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-18-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-16-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-14-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-12-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-10-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-8-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-7-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-66-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-68-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-2-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB

        • memory/1020-70-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-5-0x0000000006FF0000-0x0000000007594000-memory.dmp

          Filesize

          5.6MB

        • memory/1020-58-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-56-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-54-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-50-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-64-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-52-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-48-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-46-0x00000000067F0000-0x0000000006A35000-memory.dmp

          Filesize

          2.3MB

        • memory/1020-0-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

          Filesize

          4KB

        • memory/1020-4889-0x0000000005350000-0x000000000539C000-memory.dmp

          Filesize

          304KB

        • memory/1020-4888-0x00000000051A0000-0x0000000005226000-memory.dmp

          Filesize

          536KB

        • memory/1020-4890-0x0000000005510000-0x0000000005564000-memory.dmp

          Filesize

          336KB

        • memory/1020-4893-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB

        • memory/1020-1-0x0000000000400000-0x0000000000724000-memory.dmp

          Filesize

          3.1MB

        • memory/4332-4902-0x00000000082C0000-0x000000000830C000-memory.dmp

          Filesize

          304KB

        • memory/4332-4904-0x0000000008D80000-0x0000000008DF6000-memory.dmp

          Filesize

          472KB

        • memory/4332-4896-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB

        • memory/4332-4897-0x0000000004F60000-0x0000000004F6A000-memory.dmp

          Filesize

          40KB

        • memory/4332-4898-0x0000000008660000-0x0000000008C78000-memory.dmp

          Filesize

          6.1MB

        • memory/4332-4894-0x00000000009B0000-0x0000000000A22000-memory.dmp

          Filesize

          456KB

        • memory/4332-4895-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB

        • memory/4332-4900-0x00000000080F0000-0x0000000008102000-memory.dmp

          Filesize

          72KB

        • memory/4332-4899-0x00000000081B0000-0x00000000082BA000-memory.dmp

          Filesize

          1.0MB

        • memory/4332-4903-0x0000000008440000-0x00000000084A6000-memory.dmp

          Filesize

          408KB

        • memory/4332-4901-0x0000000008150000-0x000000000818C000-memory.dmp

          Filesize

          240KB

        • memory/4332-4905-0x0000000007ED0000-0x0000000007EEE000-memory.dmp

          Filesize

          120KB

        • memory/4332-4906-0x0000000009890000-0x0000000009A52000-memory.dmp

          Filesize

          1.8MB

        • memory/4332-4907-0x0000000009F90000-0x000000000A4BC000-memory.dmp

          Filesize

          5.2MB

        • memory/4332-4908-0x0000000074E30000-0x00000000755E0000-memory.dmp

          Filesize

          7.7MB